Side-channel countermeasures’ dissection and the limits of closed source security evaluations

被引:0
|
作者
Bronchain O. [1 ]
Standaert F.-X. [1 ]
机构
[1] ICTEAM Institute, UCLouvain, Louvain-la-Neuve
基金
欧盟地平线“2020”;
关键词
Affine Masking; Certification; Open Source Design; Security Evaluations; Shuffling; Side-Channel Attacks; Worst-Case (Multivariate) Analysis;
D O I
10.13154/tches.v2020.i2.1-25
中图分类号
学科分类号
摘要
We take advantage of a recently published open source implementation of the AES protected with a mix of countermeasures against side-channel attacks to discuss both the challenges in protecting COTS devices against such attacks and the limitations of closed source security evaluations. The target implementation has been proposed by the French ANSSI (Agence Nationale de la Sécurité des Systèmes d’Information) to stimulate research on the design and evaluation of side-channel secure implementations. It combines additive and multiplicative secret sharings into an affine masking scheme that is additionally mixed with a shuffled execution. Its preliminary leakage assessment did not detect data dependencies with up to 100,000 measurements. We first exhibit the gap between such a preliminary leakage assessment and advanced attacks by demonstrating how a countermeasures’ dissection exploiting a mix of dimensionality reduction, multivariate information extraction and key enumeration can recover the full key with less than 2,000 measurements. We then discuss the relevance of open source evaluations to analyze such implementations efficiently, by pointing out that certain steps of the attack are hard to automate without implementation knowledge (even with machine learning tools), while performing them manually is straightforward. Our findings are not due to design flaws but from the general difficulty to prevent side-channel attacks in COTS devices with limited noise. We anticipate that high security on such devices requires significantly more shares. © 2020, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:1 / 25
页数:24
相关论文
共 50 条
  • [1] Reactive side-channel countermeasures: Applicability and quantitative security evaluation
    Agosta, Giovanni
    Barenghi, Alessandro
    Pelosi, Gerardo
    Scandale, Michele
    MICROPROCESSORS AND MICROSYSTEMS, 2018, 62 : 50 - 60
  • [2] Survey on performance and security problems of countermeasures for passive side-channel attacks on ECC
    Rodrigo Abarzúa
    Claudio Valencia
    Julio López
    Journal of Cryptographic Engineering, 2021, 11 : 71 - 102
  • [3] Survey on performance and security problems of countermeasures for passive side-channel attacks on ECC
    Abarzua, Rodrigo
    Valencia, Claudio
    Lopez, Julio
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2021, 11 (01) : 71 - 102
  • [4] Towards security limits in side-channel attacks (with an application to block ciphers)
    Standaert, F. -X.
    Peeters, E.
    Archambeau, C.
    Quisquater, J. -J.
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 30 - 45
  • [5] A Survey of Side-Channel Attacks on Caches and Countermeasures
    Yangdi Lyu
    Prabhat Mishra
    Journal of Hardware and Systems Security, 2018, 2 (1) : 33 - 50
  • [6] Generic Side-Channel Countermeasures for Reconfigurable Devices
    Gueneysu, Tim
    Moradi, Amir
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 33 - 48
  • [7] Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
    Bronchain, Olivier
    Hendrickx, Julien M.
    Massart, Clement
    Olshevsky, Alex
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1, 2019, 11692 : 713 - 737
  • [8] Understanding the limitations and improving the relevance of SPICE simulations in side-channel security evaluations
    Kamel, Dina
    Renauld, Mathieu
    Flandre, Denis
    Standaert, Francois-Xavier
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2014, 4 (03) : 187 - 195
  • [9] MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations
    Camurati G.
    Dell’amico M.
    Standaert F.-X.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2023 (01): : 277 - 300
  • [10] Quantitative Evaluation of Side-channel Security
    Li, Huiyun
    Chen, Tingding
    Wu, Keke
    Yu, Fengqi
    2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 456 - 460