Randomness Optimization for Gadget Compositions in Higher-Order Masking

被引:0
|
作者
Feldtkeller J. [1 ]
Knichel D. [1 ]
Sasdrich P. [1 ]
Moradi A. [2 ]
Güneysu T. [1 ,3 ]
机构
[1] Ruhr University Bochum, Horst Görtz Institute for IT Security, Bochum
[2] University of Cologne, Institute for Computer Science
[3] DFKI, Bremen
关键词
Masking; Probe Isolating Non-Interference; Probing Security; Security-Aware EDA; Security-Aware Optimization; Strong Non-Interference;
D O I
10.46586/tches.v2022.i4.188-227
中图分类号
学科分类号
摘要
Physical characteristics of electronic devices, leaking secret and sensitive information to an adversary with physical access, pose a long-known threat to cryptographic hardware implementations. Among a variety of proposed countermeasures against such Side-Channel Analysis attacks, masking has emerged as a promising, but often costly, candidate. Furthermore, the manual realization of masked implementations has proven error-prone and often introduces flaws, possibly resulting in insecure circuits. In the context of automatic masking, a new line of research emerged, aiming to replace each physical gate with a secure gadget that fulfills well-defined properties, guaranteeing security when interconnected to a large circuit. Unfortunately, those gadgets introduce a significant amount of additional overhead into the design, in terms of area, latency, and randomness requirements. In this work, we present a novel approach to reduce the demands for randomness in such gadget-composed circuits by reusing randomness across gadgets while maintaining security in the probing adversary model. To this end, we embedded the corresponding optimization passes into an Electronic Design Automation toolchain, able to construct, optimize, and implement masked circuits, starting from an unprotected design. As such, our security-aware optimization offers an additional building block for existing or new Electronic Design Automation frameworks, where security is considered a first-class design constraint. © 2022, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:188 / 227
页数:39
相关论文
共 50 条
  • [41] Statistical Higher-Order Correlation Attacks Against Code-Based Masking
    Cheng, Wei
    Ming, Jingdian
    Guilley, Sylvain
    Danger, Jean-Luc
    IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (10) : 2364 - 2377
  • [42] PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations
    Kim, Hangi
    Jeon, Yongjin
    Kim, Giyoon
    Kim, Jongsung
    Sim, Bo-Yeon
    Han, Dong-Guk
    Seo, Hwajeong
    Kim, Seonggyeom
    Hong, Seokhie
    Sung, Jaechul
    Hong, Deukjo
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2020, 2021, 12593 : 99 - 122
  • [43] IPM-RED: combining higher-order masking with robust error detection
    Osnat Keren
    Ilia Polian
    Journal of Cryptographic Engineering, 2021, 11 : 147 - 160
  • [44] Sustainable Portfolio Optimization with Higher-Order Moments of Risk
    Khan, Kanwal Iqbal
    Naqvi, Syed M. Waqar Azeem
    Ghafoor, Muhammad Mudassar
    Akash, Rana Shahid Imdad
    SUSTAINABILITY, 2020, 12 (05)
  • [45] Automatic learning rate optimization by higher-order derivatives
    Yu, XH
    Xu, LQ
    1997 IEEE INTERNATIONAL CONFERENCE ON NEURAL NETWORKS, VOLS 1-4, 1997, : 1072 - 1077
  • [46] Optimization of PID controller with higher-order noise filter
    Micic, Aleksandar D.
    Matausek, Miroslav R.
    JOURNAL OF PROCESS CONTROL, 2014, 24 (05) : 694 - 700
  • [47] NEEDLE TRACKING THROUGH HIGHER-ORDER MRF OPTIMIZATION
    Heibel, Tim Hauke
    Glocker, Ben
    Paragios, Nikos
    Navab, Nassir
    2010 7TH IEEE INTERNATIONAL SYMPOSIUM ON BIOMEDICAL IMAGING: FROM NANO TO MACRO, 2010, : 624 - 627
  • [48] HIGHER-ORDER NECESSARY CONDITIONS FOR AN ABSTRACT OPTIMIZATION PROBLEM
    GOLLAN, B
    MATHEMATICAL PROGRAMMING STUDY, 1981, 14 (JAN): : 69 - 76
  • [49] On Higher-Order Sensitivity Analysis in Nonsmooth Vector Optimization
    H. T. H. Diem
    P. Q. Khanh
    L. T. Tung
    Journal of Optimization Theory and Applications, 2014, 162 : 463 - 488
  • [50] HIGHER-ORDER SENSITIVITY ANALYSIS IN NONCONVEX VECTOR OPTIMIZATION
    Wang, Qilin
    Li, Shengjie
    JOURNAL OF INDUSTRIAL AND MANAGEMENT OPTIMIZATION, 2010, 6 (02) : 381 - 392