Mask Compression: High-Order Masking on Memory-Constrained Devices

被引:0
|
作者
Saarinen, Markku-Juhani O. [1 ]
Rossi, Melissa [2 ]
机构
[1] PQShield Ltd, Oxford, England
[2] ANSSI, Paris, France
来源
关键词
Side-Channel Security; Mask Compression; Raccoon Signature Scheme; Post-Quantum Cryptography;
D O I
10.1007/978-3-031-53368-6_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Masking is a well-studied method for achieving provable security against side-channel attacks. In masking, each sensitive variable is split into d randomized shares, and computations are performed with those shares. In addition to the computational overhead of masked arithmetic, masking also has a storage cost, increasing the requirements for working memory and secret key storage proportionally with d. In this work, we introduce mask compression. This conceptually simple technique is based on standard, non-masked symmetric cryptography. Mask compression allows an implementation to dynamically replace individual shares of large arithmetic objects (such as polynomial rings) with kappa-bit cryptographic seeds (or temporary keys) when they are not in computational use. Since kappa does not need to be larger than the security parameter (e.g., kappa = 256 bits) and each polynomial share may be several kilobytes in size, this radically reduces the memory requirement of high-order masking. Overall provable security properties can be maintained using appropriate gadgets to manage the compressed shares. We describe gadgets with Non-Interference (NI) and composable Strong-Non Interference (SNI) security arguments. Mask compression can be applied in various settings, including symmetric cryptography, code-based cryptography, and lattice-based cryptography. It is especially useful for cryptographic primitives that allow quasilinear-complexity masking and are practically capable of very high masking orders. We illustrate this with a d = 32 (Order-31) implementation of the recently introduced lattice-based signature scheme Raccoon on an FPGA platform with limited memory resources.
引用
下载
收藏
页码:65 / 81
页数:17
相关论文
共 50 条
  • [31] MC2:: High-performance garbage collection for memory-constrained environments
    Sachindran, N
    Moss, JEB
    Berger, ED
    ACM SIGPLAN NOTICES, 2004, 39 (10) : 81 - 98
  • [32] Adaptive stabilisation of output-constrained high-order nonlinear systems with high-order and low-order nonlinearities
    Wu, You
    INTERNATIONAL JOURNAL OF CONTROL, 2024, 97 (09) : 2036 - 2043
  • [34] OPTIMAL GUIDANCE FOR HIGH-ORDER AND ACCELERATION CONSTRAINED MISSILE
    RUSNAK, I
    MEIR, L
    JOURNAL OF GUIDANCE CONTROL AND DYNAMICS, 1991, 14 (03) : 589 - 596
  • [35] THE SYMMETRY TRANSFORMATION OF THE CONSTRAINED SYSTEM WITH HIGH-ORDER DERIVATIVES
    LI, ZP
    ACTA MATHEMATICA SCIENTIA, 1985, 5 (04) : 379 - 388
  • [36] DENSE MEMORY WITH HIGH-ORDER NEURAL NETWORKS
    JEFFRIES, C
    PROCEEDINGS : THE TWENTY-FIRST SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 1989, : 436 - 439
  • [37] OPTICAL REALIZATION OF THE HIGH-ORDER ASSOCIATIVE MEMORY
    KISELEV, BS
    KULAKOV, NY
    MIKAELYAN, AL
    SHKITIN, VA
    KVANTOVAYA ELEKTRONIKA, 1990, 17 (07): : 817 - 818
  • [38] High-order Polynomial Comparison and Masking Lattice-based Encryption
    Coron, Jean-Sébastien
    Gérard, François
    Montoya, Simon
    Zeitoun, Rina
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2023 (01): : 153 - 192
  • [39] A Low-Latency High-Order Arithmetic to Boolean Masking Conversion
    Liu J.
    Zhao C.
    Peng S.
    Yang B.
    Zhao H.
    Han X.
    Zhu M.
    Wei S.
    Liu L.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (02): : 630 - 653
  • [40] Fast compression with a static model in high-order entropy
    Foschini, L
    Grossi, R
    Gupta, A
    Vitter, JS
    DCC 2004: DATA COMPRESSION CONFERENCE, PROCEEDINGS, 2004, : 62 - 71