Mask Compression: High-Order Masking on Memory-Constrained Devices

被引:0
|
作者
Saarinen, Markku-Juhani O. [1 ]
Rossi, Melissa [2 ]
机构
[1] PQShield Ltd, Oxford, England
[2] ANSSI, Paris, France
来源
关键词
Side-Channel Security; Mask Compression; Raccoon Signature Scheme; Post-Quantum Cryptography;
D O I
10.1007/978-3-031-53368-6_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Masking is a well-studied method for achieving provable security against side-channel attacks. In masking, each sensitive variable is split into d randomized shares, and computations are performed with those shares. In addition to the computational overhead of masked arithmetic, masking also has a storage cost, increasing the requirements for working memory and secret key storage proportionally with d. In this work, we introduce mask compression. This conceptually simple technique is based on standard, non-masked symmetric cryptography. Mask compression allows an implementation to dynamically replace individual shares of large arithmetic objects (such as polynomial rings) with kappa-bit cryptographic seeds (or temporary keys) when they are not in computational use. Since kappa does not need to be larger than the security parameter (e.g., kappa = 256 bits) and each polynomial share may be several kilobytes in size, this radically reduces the memory requirement of high-order masking. Overall provable security properties can be maintained using appropriate gadgets to manage the compressed shares. We describe gadgets with Non-Interference (NI) and composable Strong-Non Interference (SNI) security arguments. Mask compression can be applied in various settings, including symmetric cryptography, code-based cryptography, and lattice-based cryptography. It is especially useful for cryptographic primitives that allow quasilinear-complexity masking and are practically capable of very high masking orders. We illustrate this with a d = 32 (Order-31) implementation of the recently introduced lattice-based signature scheme Raccoon on an FPGA platform with limited memory resources.
引用
下载
收藏
页码:65 / 81
页数:17
相关论文
共 50 条
  • [1] Memory-constrained high-order entropy coding by Huffman table sharing and memory allocation
    Lee, SJ
    Song, JS
    Lee, CW
    APCCAS '96 - IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS '96, 1996, : 26 - 29
  • [2] A Metadata Encoding for Memory-Constrained Devices
    Ali, Farha
    Feaster, Yvon
    Wahba, Sally K.
    Hallstrom, Jason O.
    PROCEEDINGS OF THE 49TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE (ACMSE '11), 2011, : 191 - 196
  • [3] Garbage collector assisted memory offloading for memory-constrained devices
    Chen, DQ
    Messer, A
    Milojicic, D
    Dwarkadas, S
    FIFTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS & APPLICATIONS, PROCEEDINGS, 2003, : 54 - 63
  • [4] A new face authentication system for memory-constrained devices
    Lee, K
    Byun, H
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2003, 49 (04) : 1214 - 1222
  • [5] Heap compression for memory-constrained Java']Java environments
    Chen, G
    Kandemir, M
    Vijaykrishnan, N
    Irwin, MJ
    Mathiske, B
    Wolczko, M
    ACM SIGPLAN NOTICES, 2003, 38 (11) : 282 - 301
  • [6] Adaptive Flash Sorting for Memory-Constrained Embedded Devices
    Lawrence, Ramon
    36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 2021, : 321 - 326
  • [7] Efficient External Sorting for Memory-Constrained Embedded Devices with Flash Memory
    Jackson, Riley
    Gresl, Jonathan
    Lawrence, Ramon
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2021, 20 (04)
  • [8] Tracking Recurrent Concepts Using Context in Memory-constrained Devices
    Bartolo Gomes, Joao
    Menasalvas, Ernestina
    Sousa, Pedro A. C.
    UBICOMM 2010: THE FOURTH INTERNATIONAL CONFERENCE ON MOBILE UBIQUITOUS COMPUTING, SYSTEMS, SERVICES AND TECHNOLOGIES, 2010, : 446 - 451
  • [9] High-order masking of NTRU
    Coron J.-S.
    Gérard F.
    Trannoy M.
    Zeitoun R.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (02): : 180 - 211
  • [10] Anomaly Prediction Based on Machine Learning for Memory-Constrained Devices
    Kitagawa, Yuto
    Ishigooka, Tasuku
    Azumi, Takuya
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2019, E102D (09) : 1797 - 1807