Table Recomputation-Based Higher-Order Masking Against Horizontal Attacks

被引:1
|
作者
Guo, Zhipeng [1 ,2 ]
Tang, Ming [1 ,2 ]
Prouff, Emmanuel [3 ]
Luo, Maixing [1 ,2 ]
Yan, Fei [1 ,2 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Grp SAFRAN, F-75724 Paris, France
基金
中国国家自然科学基金;
关键词
Higher-order masking; horizontal side-channel attacks (HSCAs); side channel analysis (SCA); table recomputation-based countermeasure;
D O I
10.1109/TCAD.2018.2883900
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Masking is a class of well-known countermeasure against side-channel analysis by employing the idea of secret sharing. The theoretical security proof model of higher-order masking was initiated by Ishai, Sahai, and Wagner, and Barthe et al. pushed forward it by proposing a more refine security definition named as t-SNI security. In CHES 2016, a new attack called horizontal side-channel attacks (HSCAs) came forward and successfully broke the Rivain-Prouff countermeasure, which has been proved to satisfy the t-SNI security. It presents a dilemma: instead of more secure, masking with higher-order may be more vulnerable due to the HSCA. Although there already exists an effective countermeasure for the Rivain-Prouff scheme, it is quite difficult to apply this method in the table recomputation-based higher-order masking schemes, such as the scheme introduced by Coron in EUROCRYPT 2014. To fill this gap, we propose a new table recomputation-based higher-order masking scheme, named as table compression masking (TCM) scheme. While meeting the t-SNI security, our new countermeasure is also secure against the HSCA. We give the formal security proof under the t-SNI security definition, as well as a heuristic security analysis considering the HSCA. Our analysis shows that, by dividing the full lookup table into many distinct parts and shifting them by refreshed shares, the same share will never be manipulated for more than twice in TCM scheme. This feature gives a heuristic security against HSCA. To our best knowledge, our countermeasure is the first solution for table recomputation-based higher-order masking to resist HSCA.
引用
收藏
页码:34 / 44
页数:11
相关论文
共 50 条
  • [1] A Generic Table Recomputation-Based Higher-Order Masking
    Tang, Ming
    Qiu, Zhenlong
    Guo, Zhipeng
    Mu, Yi
    Huang, Xinyi
    Danger, Jean-Luc
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2017, 36 (11) : 1779 - 1789
  • [2] Statistical Higher-Order Correlation Attacks Against Code-Based Masking
    Cheng, Wei
    Ming, Jingdian
    Guilley, Sylvain
    Danger, Jean-Luc
    IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (10) : 2364 - 2377
  • [3] On the masking countermeasure and higher-order power analysis attacks
    Standaert, FX
    Peeters, E
    Quisquater, JJ
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 562 - 567
  • [4] Higher-order lookup table masking in essentially constant memory
    Valiveti A.
    Vivek S.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (04): : 546 - 586
  • [5] Information Leakage in Code-Based Masking: A Systematic Evaluation by Higher-Order Attacks
    Cheng, Wei
    Guilley, Sylvain
    Danger, Jean-Luc
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1624 - 1638
  • [6] Vectorizing Higher-Order Masking
    Gregoire, Benjamin
    Papagiannopoulos, Kostas
    Schwabe, Peter
    Stoffelen, Ko
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2018, 2018, 10815 : 23 - 43
  • [7] Affine Masking against Higher-Order Side Channel Analysis
    Fumaroli, Guillaume
    Martinelli, Ange
    Prouff, Emmanuel
    Rivain, Matthieu
    SELECTED AREAS IN CRYPTOGRAPHY, 2011, 6544 : 262 - 280
  • [8] Instruction-Location-Based Analysis Against Software Implementation of Higher-Order Masking
    Guo Z.-P.
    Tang M.
    Hu X.-B.
    Li Y.-G.
    Peng G.-J.
    Zhang H.-G.
    Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (05): : 929 - 941
  • [9] Verified Proofs of Higher-Order Masking
    Barthe, Gilles
    Belaid, Sonia
    Dupressoir, Francois
    Fouque, Pierre-Alain
    Gregoire, Benjamin
    Strub, Pierre-Yves
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 : 457 - 485
  • [10] Adaptive Chosen Plaintext Side-Channel Attacks for Higher-Order Masking Schemes
    Li, Yanbin
    Huang, Yuxin
    Tang, Ming
    Ren, Shougang
    Xu, Huanliang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 173 - 185