Side-channel countermeasures’ dissection and the limits of closed source security evaluations

被引:0
|
作者
Bronchain O. [1 ]
Standaert F.-X. [1 ]
机构
[1] ICTEAM Institute, UCLouvain, Louvain-la-Neuve
基金
欧盟地平线“2020”;
关键词
Affine Masking; Certification; Open Source Design; Security Evaluations; Shuffling; Side-Channel Attacks; Worst-Case (Multivariate) Analysis;
D O I
10.13154/tches.v2020.i2.1-25
中图分类号
学科分类号
摘要
We take advantage of a recently published open source implementation of the AES protected with a mix of countermeasures against side-channel attacks to discuss both the challenges in protecting COTS devices against such attacks and the limitations of closed source security evaluations. The target implementation has been proposed by the French ANSSI (Agence Nationale de la Sécurité des Systèmes d’Information) to stimulate research on the design and evaluation of side-channel secure implementations. It combines additive and multiplicative secret sharings into an affine masking scheme that is additionally mixed with a shuffled execution. Its preliminary leakage assessment did not detect data dependencies with up to 100,000 measurements. We first exhibit the gap between such a preliminary leakage assessment and advanced attacks by demonstrating how a countermeasures’ dissection exploiting a mix of dimensionality reduction, multivariate information extraction and key enumeration can recover the full key with less than 2,000 measurements. We then discuss the relevance of open source evaluations to analyze such implementations efficiently, by pointing out that certain steps of the attack are hard to automate without implementation knowledge (even with machine learning tools), while performing them manually is straightforward. Our findings are not due to design flaws but from the general difficulty to prevent side-channel attacks in COTS devices with limited noise. We anticipate that high security on such devices requires significantly more shares. © 2020, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:1 / 25
页数:24
相关论文
共 50 条
  • [31] FPGA Implementations of SPRING And Their Countermeasures against Side-Channel Attacks
    Brenner, Hai
    Gaspar, Lubos
    Leurent, Gaetan
    Rosen, Alon
    Standaert, Francois-Xavier
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2014, 2014, 8731 : 414 - 432
  • [32] Spectral Features of Higher-Order Side-Channel Countermeasures
    Zaccaria, V.
    Melzani, F.
    Bertoni, G.
    IEEE TRANSACTIONS ON COMPUTERS, 2018, 67 (04) : 596 - 603
  • [33] Security analysis on dummy based side-channel countermeasures-Case study: AES with dummy and shuffling
    Lee, JongHyeok
    Han, Dong-Guk
    APPLIED SOFT COMPUTING, 2020, 93
  • [34] Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures
    Su, Chao
    Zeng, Qingkai
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [35] Plaintext: A missing feature for enhancing the power of deep learning in side-channel analysis? Breaking multiple layers of side-channel countermeasures
    Hoang A.-T.
    Hanley N.
    O’Neill M.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (04): : 49 - 85
  • [36] Security Evaluations beyond Computing Power How to Analyze Side-Channel Attacks You Cannot Mount?
    Veyrat-Charvillon, Nicolas
    Gerard, Benoit
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 126 - 141
  • [37] Leakage Assessment Methodology A Clear Roadmap for Side-Channel Evaluations
    Schneider, Tobias
    Moradi, Amir
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 495 - 513
  • [38] Towards efficient and automated side-channel evaluations at design time
    Danilo Šijačić
    Josep Balasch
    Bohan Yang
    Santosh Ghosh
    Ingrid Verbauwhede
    Journal of Cryptographic Engineering, 2020, 10 : 305 - 319
  • [39] Towards efficient and automated side-channel evaluations at design time
    Sijacic, Danilo
    Balasch, Josep
    Yang, Bohan
    Ghosh, Santosh
    Verbauwhede, Ingrid
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (04) : 305 - 319
  • [40] A Study of Timing Side-Channel Attacks and Countermeasures on Java']JavaScript and WebAssembly
    Mazaheri, Mohammad Erfan
    Sarmadi, Siavash Bayat
    Ardakani, Farhad Taheri
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 14 (01): : 1 - 20