Randomness Optimization for Gadget Compositions in Higher-Order Masking

被引:0
|
作者
Feldtkeller J. [1 ]
Knichel D. [1 ]
Sasdrich P. [1 ]
Moradi A. [2 ]
Güneysu T. [1 ,3 ]
机构
[1] Ruhr University Bochum, Horst Görtz Institute for IT Security, Bochum
[2] University of Cologne, Institute for Computer Science
[3] DFKI, Bremen
关键词
Masking; Probe Isolating Non-Interference; Probing Security; Security-Aware EDA; Security-Aware Optimization; Strong Non-Interference;
D O I
10.46586/tches.v2022.i4.188-227
中图分类号
学科分类号
摘要
Physical characteristics of electronic devices, leaking secret and sensitive information to an adversary with physical access, pose a long-known threat to cryptographic hardware implementations. Among a variety of proposed countermeasures against such Side-Channel Analysis attacks, masking has emerged as a promising, but often costly, candidate. Furthermore, the manual realization of masked implementations has proven error-prone and often introduces flaws, possibly resulting in insecure circuits. In the context of automatic masking, a new line of research emerged, aiming to replace each physical gate with a secure gadget that fulfills well-defined properties, guaranteeing security when interconnected to a large circuit. Unfortunately, those gadgets introduce a significant amount of additional overhead into the design, in terms of area, latency, and randomness requirements. In this work, we present a novel approach to reduce the demands for randomness in such gadget-composed circuits by reusing randomness across gadgets while maintaining security in the probing adversary model. To this end, we embedded the corresponding optimization passes into an Electronic Design Automation toolchain, able to construct, optimize, and implement masked circuits, starting from an unprotected design. As such, our security-aware optimization offers an additional building block for existing or new Electronic Design Automation frameworks, where security is considered a first-class design constraint. © 2022, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:188 / 227
页数:39
相关论文
共 50 条
  • [31] Constant-time higher-order Boolean-to-arithmetic masking
    Michael Hutter
    Michael Tunstall
    Journal of Cryptographic Engineering, 2019, 9 : 173 - 184
  • [32] maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults
    Barthe, Gilles
    Belaid, Sonia
    Cassiers, Gaetan
    Fouque, Pierre-Alain
    Gregoire, Benjamin
    Standaert, Francois-Xavier
    COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 300 - 318
  • [33] Higher-order intentionality and higher-order acquaintance
    Hellie, Benj
    PHILOSOPHICAL STUDIES, 2007, 134 (03) : 289 - 324
  • [34] Efficient optimization with higher-order Ising machines
    Connor Bybee
    Denis Kleyko
    Dmitri E. Nikonov
    Amir Khosrowshahi
    Bruno A. Olshausen
    Friedrich T. Sommer
    Nature Communications, 14
  • [35] Efficient optimization with higher-order ising machines
    Bybee, Connor
    Kleyko, Denis
    Nikonov, Dmitri E.
    Khosrowshahi, Amir
    Olshausen, Bruno A.
    Sommer, Friedrich T.
    NATURE COMMUNICATIONS, 2023, 14 (01)
  • [36] Table Recomputation-Based Higher-Order Masking Against Horizontal Attacks
    Guo, Zhipeng
    Tang, Ming
    Prouff, Emmanuel
    Luo, Maixing
    Yan, Fei
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (01) : 34 - 44
  • [37] Higher-Order Efficiency Conditions for Vector Nonsmooth Optimization Problems Using the Higher-Order Gâteaux Derivatives
    Van Su, Tran
    Hang, Dinh Dieu
    BULLETIN OF THE IRANIAN MATHEMATICAL SOCIETY, 2024, 50 (05)
  • [38] A Fast and Provably Secure Higher-Order Masking of AES S-Box
    Kim, HeeSeok
    Hong, Seokhie
    Lim, Jongin
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 95 - 107
  • [39] IPM-RED: combining higher-order masking with robust error detection
    Keren, Osnat
    Polian, Ilia
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2021, 11 (02) : 147 - 160
  • [40] Optimizing Higher-Order Correlation Analysis Against Inner Product Masking Scheme
    Ming, Jingdian
    Zhou, Yongbin
    Cheng, Wei
    Li, Huizhong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3555 - 3568