Achieving side-channel high-order correlation immunity with leakage squeezing

被引:20
|
作者
Carlet, Claude [1 ,2 ]
Danger, Jean-Luc [3 ,4 ]
Guilley, Sylvain [4 ,5 ]
Maghrebi, Houssem [5 ,6 ]
Prouff, Emmanuel [7 ]
机构
[1] Univ Paris VIII, CNRS, Dept Math, LAGA,UMR 7539, F-93526 St Denis, France
[2] Univ Paris XIII, CNRS, Dept Math, LAGA,UMR 7539, F-93526 St Denis, Reunion, France
[3] CNRS LTCI UMR 5141, Inst Mines Telecom Telecom ParisTech, Dept COMELEC, F-75634 Paris, France
[4] Secure IC SAS, F-35700 Rennes, France
[5] CNRS LTCI UMR 5141, Inst Mines Telecom Telecom ParisTech, Dept COMELEC, 37-39 Rue Dareau, F-75014 Paris, France
[6] Morpho Safran, F-95520 Osny, France
[7] Agcy Natl Secur Syst Informat, F-75700 Paris 07, SP, France
关键词
High-order masking; High-order correlation power analysis (HO-CPA); High-order CPA immunity (HCI); Mutual information metric (MIM); Leakage squeezing;
D O I
10.1007/s13389-013-0067-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This article deeply analyzes high-order (HO) Boolean masking countermeasures against side-channel attacks in contexts where the shares are manipulated simultaneously and the correlation coefficient is used as a statistical distinguisher. The latter attacks are sometimes referred to as zero-offset high-order correlation power analysis (HO-CPA). In particular, the main focus is to get the most out of a single mask (i.e., for masking schemes with two shares). The relationship between the leakage characteristics and the attack efficiency is thoroughly studied. Our main contribution is to link the minimum attack order (called HO-CPA immunity) to the amount of information leaked. Interestingly, the HO-CPA immunity can be much larger than the number of shares in the masking scheme. This is made possible by the leakage squeezing. It is a variant of theBoolean masking where masks are recoded relevantly by bijections. This technique and others from the state-of-the-art (namely leak-free masking and wire-tap codes) are overviewed, and put in perspective.
引用
收藏
页码:107 / 121
页数:15
相关论文
共 50 条
  • [21] Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-level
    Yao, Yuan
    Kathuria, Tarun
    Ege, Baris
    Schaumont, Patrick
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2020, : 188 - 196
  • [22] High Order Side-Channel Security for Elliptic-Curve Implementations
    Belaïd, Sonia
    Rivain, Matthieu
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2023 (01): : 238 - 276
  • [23] Hiding Higher-Order Side-Channel Leakage Randomizing Cryptographic Implementations in Reconfigurable Hardware
    Sasdrich, Pascal
    Moradi, Amir
    Gueneysu, Tim
    TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 131 - 146
  • [24] A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models
    Heuser, Annelie
    Kasper, Michael
    Schindler, Werner
    Stoettinger, Marc
    TOPICS IN CRYPTOLOGY - CT-RSA 2012, 2012, 7178 : 365 - +
  • [25] Side-Channel Information Leakage of Traffic Data in Instant Messaging
    Li, Ke
    Li, Hong
    Zhu, Hongsong
    Sun, Limin
    Wen, Hui
    2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2019,
  • [26] Preprocessing of the Physical Leakage Information to Combine Side-Channel Distinguishers
    Seckiner, Soner
    Kose, Selcuk
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (12) : 2052 - 2063
  • [27] Optimal strategies for side-channel leakage in FCFS packet schedulers
    Shintre, Saurabh
    Gligor, Virgil
    Barros, Joao
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 2515 - 2519
  • [28] Rassle: Return address stack based side-channel leakage
    Chakraborty, Anirban
    Bhattacharya, Sarani
    Alam, Manaar
    Patranabis, Sikhar
    Mukhopadhyay, Debdeep
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (02): : 275 - 303
  • [29] Leakage Assessment Methodology A Clear Roadmap for Side-Channel Evaluations
    Schneider, Tobias
    Moradi, Amir
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 495 - 513
  • [30] Exploiting the microarchitectural leakage of prefetching activities for side-channel attacks
    Xiao, Chong
    Tang, Ming
    Guilley, Sylvain
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 139