Achieving side-channel high-order correlation immunity with leakage squeezing

被引:20
|
作者
Carlet, Claude [1 ,2 ]
Danger, Jean-Luc [3 ,4 ]
Guilley, Sylvain [4 ,5 ]
Maghrebi, Houssem [5 ,6 ]
Prouff, Emmanuel [7 ]
机构
[1] Univ Paris VIII, CNRS, Dept Math, LAGA,UMR 7539, F-93526 St Denis, France
[2] Univ Paris XIII, CNRS, Dept Math, LAGA,UMR 7539, F-93526 St Denis, Reunion, France
[3] CNRS LTCI UMR 5141, Inst Mines Telecom Telecom ParisTech, Dept COMELEC, F-75634 Paris, France
[4] Secure IC SAS, F-35700 Rennes, France
[5] CNRS LTCI UMR 5141, Inst Mines Telecom Telecom ParisTech, Dept COMELEC, 37-39 Rue Dareau, F-75014 Paris, France
[6] Morpho Safran, F-95520 Osny, France
[7] Agcy Natl Secur Syst Informat, F-75700 Paris 07, SP, France
关键词
High-order masking; High-order correlation power analysis (HO-CPA); High-order CPA immunity (HCI); Mutual information metric (MIM); Leakage squeezing;
D O I
10.1007/s13389-013-0067-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This article deeply analyzes high-order (HO) Boolean masking countermeasures against side-channel attacks in contexts where the shares are manipulated simultaneously and the correlation coefficient is used as a statistical distinguisher. The latter attacks are sometimes referred to as zero-offset high-order correlation power analysis (HO-CPA). In particular, the main focus is to get the most out of a single mask (i.e., for masking schemes with two shares). The relationship between the leakage characteristics and the attack efficiency is thoroughly studied. Our main contribution is to link the minimum attack order (called HO-CPA immunity) to the amount of information leaked. Interestingly, the HO-CPA immunity can be much larger than the number of shares in the masking scheme. This is made possible by the leakage squeezing. It is a variant of theBoolean masking where masks are recoded relevantly by bijections. This technique and others from the state-of-the-art (namely leak-free masking and wire-tap codes) are overviewed, and put in perspective.
引用
收藏
页码:107 / 121
页数:15
相关论文
共 50 条
  • [31] Impacts of HLS Optimizations on Side-Channel Leakage for AES Circuits
    Mizuno, Takumi
    Zhang, Qidi
    Nishikawa, Hiroki
    Kong, Xiangbo
    Tomiyama, Hiroyuki
    18TH INTERNATIONAL SOC DESIGN CONFERENCE 2021 (ISOCC 2021), 2021, : 53 - 54
  • [32] Electromagnetic Information Leakage for Side-Channel Analysis of Cryptographic Modules
    Homma, Naofumi
    Aoki, Takafumi
    Satoh, Akashi
    2010 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC 2010), 2010, : 97 - 102
  • [33] Leakage Prototype Learning for Profiled Differential Side-Channel Cryptanalysis
    Bartkewitz, Timo
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (06) : 1761 - 1774
  • [34] EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
    Ding, Ruyi
    Cheng Gongye
    Wang, Siyue
    Ding, Aidong Adam
    Fei, Yunsi
    PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023, 2023, : 300 - 313
  • [35] Side-Channel Attacks With Multi-Thread Mixed Leakage
    Gao, Yiwen
    Zhou, Yongbin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 770 - 785
  • [36] Side-Channel Leakage on Silicon Substrate of CMOS Cryptographic Chip
    Fujimoto, Daisuke
    Tanaka, Daichi
    Miura, Noriyuki
    Nagata, Makoto
    Hayashi, Yu-ichi
    Homma, Naofumi
    Bhasin, Shivam
    Danger, Jean-Luc
    2014 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), 2014, : 32 - 37
  • [37] Comparison of side-channel leakage on Rich and Trusted Execution Environments
    Leignac, Paul
    Potin, Olivier
    Rigaud, Jean-Baptiste
    Dutertre, Jean-Max
    Pontie, Simon
    PROCEEDINGS OF THE SIXTH WORKSHOP ON CRYPTOGRAPHY AND SECURITY IN COMPUTING SYSTEMS CS2 2019, 2016, : 19 - 22
  • [38] Exposing Side-Channel Leakage of SEAL Homomorphic Encryption Library
    Aydin, Furkan
    Aysu, Aydin
    PROCEEDINGS OF THE 2022 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY, ASHES 2022, 2022, : 95 - 100
  • [39] Side-channel Vulnerability Factor: A Metric for Measuring Information Leakage
    Demme, John
    Martin, Robert
    Waksman, Adam
    Sethumadhavan, Simha
    2012 39TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA), 2012, : 106 - 117
  • [40] A First Study of Compressive Sensing for Side-Channel Leakage Sampling
    Ou, Changhai
    Zhou, Chengju
    Lam, Siew-Kei
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (10) : 2166 - 2177