Randomness Optimization for Gadget Compositions in Higher-Order Masking

被引:0
|
作者
Feldtkeller J. [1 ]
Knichel D. [1 ]
Sasdrich P. [1 ]
Moradi A. [2 ]
Güneysu T. [1 ,3 ]
机构
[1] Ruhr University Bochum, Horst Görtz Institute for IT Security, Bochum
[2] University of Cologne, Institute for Computer Science
[3] DFKI, Bremen
关键词
Masking; Probe Isolating Non-Interference; Probing Security; Security-Aware EDA; Security-Aware Optimization; Strong Non-Interference;
D O I
10.46586/tches.v2022.i4.188-227
中图分类号
学科分类号
摘要
Physical characteristics of electronic devices, leaking secret and sensitive information to an adversary with physical access, pose a long-known threat to cryptographic hardware implementations. Among a variety of proposed countermeasures against such Side-Channel Analysis attacks, masking has emerged as a promising, but often costly, candidate. Furthermore, the manual realization of masked implementations has proven error-prone and often introduces flaws, possibly resulting in insecure circuits. In the context of automatic masking, a new line of research emerged, aiming to replace each physical gate with a secure gadget that fulfills well-defined properties, guaranteeing security when interconnected to a large circuit. Unfortunately, those gadgets introduce a significant amount of additional overhead into the design, in terms of area, latency, and randomness requirements. In this work, we present a novel approach to reduce the demands for randomness in such gadget-composed circuits by reusing randomness across gadgets while maintaining security in the probing adversary model. To this end, we embedded the corresponding optimization passes into an Electronic Design Automation toolchain, able to construct, optimize, and implement masked circuits, starting from an unprotected design. As such, our security-aware optimization offers an additional building block for existing or new Electronic Design Automation frameworks, where security is considered a first-class design constraint. © 2022, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:188 / 227
页数:39
相关论文
共 50 条
  • [21] Generalized higher-order cone-convex functions and higher-order duality in vector optimization
    Suneja, S. K.
    Sharma, Sunila
    Yadav, Priyanka
    ANNALS OF OPERATIONS RESEARCH, 2018, 269 (1-2) : 709 - 725
  • [22] Generalized higher-order cone-convex functions and higher-order duality in vector optimization
    S. K. Suneja
    Sunila Sharma
    Priyanka Yadav
    Annals of Operations Research, 2018, 269 : 709 - 725
  • [23] Security analysis of higher-order Boolean masking schemes for block ciphers (with conditions of perfect masking)
    Piret, G.
    Standaert, F-X.
    IET INFORMATION SECURITY, 2008, 2 (01) : 1 - 11
  • [24] Accelerating Higher-Order Masking of AES Using Composite Field and SIMD
    Miyajan, Abdulaziz
    Shi, Zhijie
    Huang, Chun-Hsi
    Al-Somani, Turki F.
    2015 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT), 2015, : 575 - 580
  • [25] Speedup Higher-Order Masking of AES sing Normal Basis and SIMD
    Miyajan, Abdulaziz
    Huang, Chun-Hsi
    Al-Somani, Turki F.
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2016, : 293 - 298
  • [26] Higher-Order Intentionality and Higher-Order Acquaintance
    Benj Hellie
    Philosophical Studies, 2007, 134 : 289 - 324
  • [27] Constant-time higher-order Boolean-to-arithmetic masking
    Hutter, Michael
    Tunstall, Michael
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2019, 9 (02) : 173 - 184
  • [28] Hiding Higher-Order Univariate Leakages by Shuffling Polynomial Masking Schemes
    De Santis, Fabrizio
    Bauer, Tobias
    Sigl, Georg
    PROCEEDINGS OF THE 2016 ACM WORKSHOP ON THE THEORY OF IMPLEMENTATION SECURITY (TIS'16), 2016, : 17 - 26
  • [29] Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
    Roy, Arnab
    Vivek, Srinivas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2013, 2013, 8086 : 417 - 434
  • [30] Leak Point Locating in Hardware Implementations of Higher-Order Masking Schemes
    Tang Ming
    Li Yanbin
    Zhao Dongyan
    Li Yuguang
    Yan Fei
    Zhang Huanguo
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (12) : 3008 - 3019