Formal Definition and Verification for Combined Random Fault and Random Probing Security

被引:0
|
作者
Belaid, Sonia [1 ]
Feldtkeller, Jakob [2 ]
Gueneysu, Tim [2 ,3 ]
Guinet, Anna [2 ]
Richter-Brockmann, Jan [2 ]
Rivain, Matthieu [1 ]
Sasdrich, Pascal [2 ]
Taleb, Abdul Rahman [1 ]
机构
[1] CryptoExperts, Paris, France
[2] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
[3] DFKI, Bremen, Germany
关键词
Physical Security; Random Probing Model; Random Fault Model; Combined Analysis; VERICA; IronMask; SIDE-CHANNEL; PRIVATE CIRCUITS; COUNTERMEASURES;
D O I
10.1007/978-981-96-0941-3_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In our highly digitalized world, an adversary is not constrained to purely digital attacks but can monitor or influence the physical execution environment of a target computing device. Such side-channel or fault-injection analysis poses a significant threat to otherwise secure cryptographic implementations. Hence, it is important to consider additional adversarial capabilities when analyzing the security of cryptographic implementations besides the default black-box model. For side-channel analysis, this is done by providing the adversary with knowledge of some internal values, while for fault-injection analysis the capabilities of the adversaries include manipulation of some internal values. In this work, we extend probabilistic security models for physical attacks, by introducing a general random probing model and a general random fault model to enable security analysis with arbitrary leakage and fault distributions, as well as the combination of these models. Our aim is to enable a more accurate modeling of low-level physical effects. We then analyze important properties, such as the impact of adversarial knowledge on faults and compositions, and provide tool-based formal verification methods that allow the security assessment of design components. These methods are introduced as extension of previous tools VERICA and IronMask which are implemented, evaluated and compared.
引用
收藏
页码:167 / 200
页数:34
相关论文
共 50 条
  • [1] Random Probing Security: Verification, Composition, Expansion and New Constructions
    Belaid, Sonia
    Coron, Jean-Sebastien
    Prouff, Emmanuel
    Rivain, Matthieu
    Taleb, Abdul Rahman
    ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I, 2020, 12170 : 339 - 368
  • [2] The use of random simulation in formal verification
    Krohm, F
    Kuehlmann, A
    Mets, A
    INTERNATIONAL CONFERENCE ON COMPUTER DESIGN - VLSI IN COMPUTERS AND PROCESSORS, PROCEEDINGS, 1996, : 371 - 376
  • [3] Towards Tight Random Probing Security
    Cassiers, Gaetan
    Faust, Sebastian
    Orlt, Maximilian
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 185 - 214
  • [4] Formal Verification Based on Guided Random Walks
    Bui, Thang H.
    Nymeyer, Albert
    INTEGRATED FORMAL METHODS, PROCEEDINGS, 2009, 5423 : 72 - 87
  • [5] Formal verification of a radio network random access protocol
    Roumane, Ahmed
    Kechar, Bouabdellah
    Kouninef, Belkacem
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (18)
  • [6] FORMAL DEFINITION AND ENTROPY CALCULATION OF HIERARCHICAL ATTRIBUTED RANDOM GRAPH
    SEONG, DS
    KIM, HS
    PARK, KH
    PATTERN RECOGNITION LETTERS, 1992, 13 (08) : 545 - 555
  • [7] DEFINITION OF RANDOM
    PITCHER, HHW
    COMPUTER JOURNAL, 1974, 17 (04): : 381 - 381
  • [8] On formal definition and analysis of formal verification processes
    Osterweil, Leon J.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8373 : 35 - 52
  • [9] An Algebraic Approach for Evaluating Random Probing Security With Application to AES
    Jahandideh, Vahid
    Mennink, Bart
    Batina, Lejla
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (04): : 657 - 689
  • [10] Separation of random phase mask in optical correlator for security verification
    Muravsky, LI
    Fitio, VM
    Shovgenyuk, MV
    Hlushak, PA
    ALGORITHMS, DEVICES, AND SYSTEMS FOR OPTICAL INFORMATION PROCESSING, 1998, 3466 : 267 - 277