Table Recomputation-Based Higher-Order Masking Against Horizontal Attacks

被引:1
|
作者
Guo, Zhipeng [1 ,2 ]
Tang, Ming [1 ,2 ]
Prouff, Emmanuel [3 ]
Luo, Maixing [1 ,2 ]
Yan, Fei [1 ,2 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Grp SAFRAN, F-75724 Paris, France
基金
中国国家自然科学基金;
关键词
Higher-order masking; horizontal side-channel attacks (HSCAs); side channel analysis (SCA); table recomputation-based countermeasure;
D O I
10.1109/TCAD.2018.2883900
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Masking is a class of well-known countermeasure against side-channel analysis by employing the idea of secret sharing. The theoretical security proof model of higher-order masking was initiated by Ishai, Sahai, and Wagner, and Barthe et al. pushed forward it by proposing a more refine security definition named as t-SNI security. In CHES 2016, a new attack called horizontal side-channel attacks (HSCAs) came forward and successfully broke the Rivain-Prouff countermeasure, which has been proved to satisfy the t-SNI security. It presents a dilemma: instead of more secure, masking with higher-order may be more vulnerable due to the HSCA. Although there already exists an effective countermeasure for the Rivain-Prouff scheme, it is quite difficult to apply this method in the table recomputation-based higher-order masking schemes, such as the scheme introduced by Coron in EUROCRYPT 2014. To fill this gap, we propose a new table recomputation-based higher-order masking scheme, named as table compression masking (TCM) scheme. While meeting the t-SNI security, our new countermeasure is also secure against the HSCA. We give the formal security proof under the t-SNI security definition, as well as a heuristic security analysis considering the HSCA. Our analysis shows that, by dividing the full lookup table into many distinct parts and shifting them by refreshed shares, the same share will never be manipulated for more than twice in TCM scheme. This feature gives a heuristic security against HSCA. To our best knowledge, our countermeasure is the first solution for table recomputation-based higher-order masking to resist HSCA.
引用
收藏
页码:34 / 44
页数:11
相关论文
共 50 条
  • [21] Masking kyber: First-and higher-order implementations
    Bos J.W.
    Gourjon M.
    Renes J.
    Schneider T.
    van Vredendaal C.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (04): : 173 - 214
  • [22] PFD-A Flexible Higher-Order Masking Scheme
    Tang, Ming
    Guo, Zhipeng
    Heuser, Annelie
    Ren, Yanzhen
    Li, Jie
    Danger, Jean-Luc
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2017, 36 (08) : 1327 - 1339
  • [23] Randomness Optimization for Gadget Compositions in Higher-Order Masking
    Feldtkeller J.
    Knichel D.
    Sasdrich P.
    Moradi A.
    Güneysu T.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 188 - 227
  • [24] Higher-Order Masking Scheme against DPA Attack in Practice: McEliece Cryptosystem Based on QD-MDPC Code
    Han, Mu
    Wang, Yunwen
    Ma, Shidian
    Wan, Ailan
    Liu, Shuai
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (02): : 1100 - 1123
  • [25] Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
    Rivain, Matthieu
    Prouff, Emmanuel
    Doget, Julien
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 171 - 188
  • [26] Boosting Higher-Order Correlation Attacks by Dimensionality Reduction
    Bruneau, Nicolas
    Danger, Jean-Luc
    Guilley, Sylvain
    Heuser, Annelie
    Teglia, Yannick
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, 2014, 8804 : 183 - +
  • [27] Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
    Goudarzi, Dahmun
    Journault, Anthony
    Rivain, Matthieu
    Standaert, Francois-Xavier
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2018, 2018, 10815 : 3 - 22
  • [28] Correlation Power Analysis and Higher-Order Masking Implementation of WAGE
    Fei, Yunsi
    Gong, Guang
    Gongye, Cheng
    Mandal, Kalikinkar
    Rohit, Raghvendra
    Xu, Tianhong
    Yi, Yunjie
    Zidaric, Nusa
    SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 593 - 614
  • [29] Logical Encoding of Argumentation Frameworks with Higher-order Attacks
    Cayrol, Claudette
    Lagasquie-Schiex, Marie-Christine
    2018 IEEE 30TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI), 2018, : 667 - 674
  • [30] Argumentation Frameworks with Higher-Order Attacks: Labellings and Complexity
    Doutre, Sylvie
    Lafages, Mickael
    Lagasquie-Schiex, Marie-Christine
    2020 IEEE 32ND INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI), 2020, : 1210 - 1217