Mask Compression: High-Order Masking on Memory-Constrained Devices

被引:0
|
作者
Saarinen, Markku-Juhani O. [1 ]
Rossi, Melissa [2 ]
机构
[1] PQShield Ltd, Oxford, England
[2] ANSSI, Paris, France
来源
关键词
Side-Channel Security; Mask Compression; Raccoon Signature Scheme; Post-Quantum Cryptography;
D O I
10.1007/978-3-031-53368-6_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Masking is a well-studied method for achieving provable security against side-channel attacks. In masking, each sensitive variable is split into d randomized shares, and computations are performed with those shares. In addition to the computational overhead of masked arithmetic, masking also has a storage cost, increasing the requirements for working memory and secret key storage proportionally with d. In this work, we introduce mask compression. This conceptually simple technique is based on standard, non-masked symmetric cryptography. Mask compression allows an implementation to dynamically replace individual shares of large arithmetic objects (such as polynomial rings) with kappa-bit cryptographic seeds (or temporary keys) when they are not in computational use. Since kappa does not need to be larger than the security parameter (e.g., kappa = 256 bits) and each polynomial share may be several kilobytes in size, this radically reduces the memory requirement of high-order masking. Overall provable security properties can be maintained using appropriate gadgets to manage the compressed shares. We describe gadgets with Non-Interference (NI) and composable Strong-Non Interference (SNI) security arguments. Mask compression can be applied in various settings, including symmetric cryptography, code-based cryptography, and lattice-based cryptography. It is especially useful for cryptographic primitives that allow quasilinear-complexity masking and are practically capable of very high masking orders. We illustrate this with a d = 32 (Order-31) implementation of the recently introduced lattice-based signature scheme Raccoon on an FPGA platform with limited memory resources.
引用
下载
收藏
页码:65 / 81
页数:17
相关论文
共 50 条
  • [11] Access Pattern-Based Code Compression For Memory-Constrained Systems
    Ozturk, Ozcan
    Kandemir, Mahmut
    Chen, Guangyu
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2008, 13 (04)
  • [12] An OPC UA PubSub Implementation Approach for Memory-Constrained Sensor Devices
    Quang-Duy Nguyen
    Bellot, Patrick
    Petton, Pierre-Yves
    2022 IEEE 31ST INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2022, : 999 - 1005
  • [13] FlexNN: Efficient and Adaptive DNN Inference on Memory-Constrained Edge Devices
    Li, Xiangyu
    Li, Yuanchun
    Li, Yuanzhe
    Cao, Ting
    Liu, Yunxin
    PROCEEDINGS OF THE THIRTIETH INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, ACM MOBICOM 2024, 2024, : 709 - 723
  • [14] Accelerating Random Forest on Memory-Constrained Devices Through Data Storage Optimization
    Slimani, Camelia
    Wu, Chun-Feng
    Rubini, Stephane
    Chang, Yuan-Hao
    Boukhobza, Jalil
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (06) : 1595 - 1609
  • [15] Model-Distributed DNN Training for Memory-Constrained Edge Computing Devices
    Li, Pengzhen
    Seferoglu, Hulya
    Dasarit, Venkat R.
    Koyuncu, Erdem
    2021 27TH IEEE INTERNATIONAL SYMPOSIUM ON LOCAL AND METROPOLITAN AREA NETWORKS (LANMAN), 2021,
  • [16] Improved Gadgets for the High-Order Masking of Dilithium
    Coron J.-S.
    Gérard F.
    Trannoy M.
    Zeitoun R.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (04): : 110 - 145
  • [17] Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking
    Naito, Yusuke
    Sasaki, Yu
    Sugawara, Takeshi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT III, 2022, 13509 : 315 - 345
  • [18] Anomaly Prediction Based on k-means Clustering for Memory-constrained Embedded Devices
    Kitagawa, Yuto
    Ishigoka, Tasuku
    Azumi, Takuya
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2017, : 26 - 33
  • [19] XAMM: A high-performance automatic memory management system with memory-constrained designs
    Wu, GS
    Zhou, X
    Lueh, GY
    Fang, JZ
    Guo, P
    Peng, JZ
    Ying, V
    HIGH PERFORMANCE EMBEDDED ARCHITECTURES AND COMPILERS, PROCEEDINGS, 2005, 3793 : 130 - 149
  • [20] Efficient Flash Indexing for Time Series Data on Memory-constrained Embedded Sensor Devices
    Fazackerley, Scott
    Ould-Khessal, Nadir
    Lawrence, Ramon
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SENSOR NETWORKS (SENSORNETS), 2021, : 92 - 99