Table Recomputation-Based Higher-Order Masking Against Horizontal Attacks

被引:1
|
作者
Guo, Zhipeng [1 ,2 ]
Tang, Ming [1 ,2 ]
Prouff, Emmanuel [3 ]
Luo, Maixing [1 ,2 ]
Yan, Fei [1 ,2 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Grp SAFRAN, F-75724 Paris, France
基金
中国国家自然科学基金;
关键词
Higher-order masking; horizontal side-channel attacks (HSCAs); side channel analysis (SCA); table recomputation-based countermeasure;
D O I
10.1109/TCAD.2018.2883900
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Masking is a class of well-known countermeasure against side-channel analysis by employing the idea of secret sharing. The theoretical security proof model of higher-order masking was initiated by Ishai, Sahai, and Wagner, and Barthe et al. pushed forward it by proposing a more refine security definition named as t-SNI security. In CHES 2016, a new attack called horizontal side-channel attacks (HSCAs) came forward and successfully broke the Rivain-Prouff countermeasure, which has been proved to satisfy the t-SNI security. It presents a dilemma: instead of more secure, masking with higher-order may be more vulnerable due to the HSCA. Although there already exists an effective countermeasure for the Rivain-Prouff scheme, it is quite difficult to apply this method in the table recomputation-based higher-order masking schemes, such as the scheme introduced by Coron in EUROCRYPT 2014. To fill this gap, we propose a new table recomputation-based higher-order masking scheme, named as table compression masking (TCM) scheme. While meeting the t-SNI security, our new countermeasure is also secure against the HSCA. We give the formal security proof under the t-SNI security definition, as well as a heuristic security analysis considering the HSCA. Our analysis shows that, by dividing the full lookup table into many distinct parts and shifting them by refreshed shares, the same share will never be manipulated for more than twice in TCM scheme. This feature gives a heuristic security against HSCA. To our best knowledge, our countermeasure is the first solution for table recomputation-based higher-order masking to resist HSCA.
引用
收藏
页码:34 / 44
页数:11
相关论文
共 50 条
  • [31] On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking
    Goudarzi, Dahmun
    Rivain, Matthieu
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 : 457 - 478
  • [32] Towards Algorithms for Argumentation Frameworks with Higher-order Attacks
    Doutre, Sylvie
    Lafages, Mickael
    Lagasquie-Schiex, Marie-Christine
    INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS, 2022, 31 (07)
  • [33] Structure-Based Semantics of Argumentation Frameworks with Higher-Order Attacks and Supports
    Cayrol, Claudette
    Fandinno, Jorge
    del Cerro, Luis Farinas
    Lagasquie-Schiex, Marie-Christine
    COMPUTATIONAL MODELS OF ARGUMENT (COMMA 2018), 2018, 305 : 29 - 36
  • [34] A credulous semantics of higher-order argumentation frameworks based on credulously accepted attacks
    Wu, Jiachao
    Tang, Shuai
    Zhou, Ning
    JOURNAL OF LOGIC AND COMPUTATION, 2025,
  • [35] Second-order power analysis attacks against precomputation based masking countermeasure
    Li W.
    Yi H.
    1600, Science and Engineering Research Support Society (10): : 259 - 270
  • [36] Security analysis of higher-order Boolean masking schemes for block ciphers (with conditions of perfect masking)
    Piret, G.
    Standaert, F-X.
    IET INFORMATION SECURITY, 2008, 2 (01) : 1 - 11
  • [37] Accelerating Higher-Order Masking of AES Using Composite Field and SIMD
    Miyajan, Abdulaziz
    Shi, Zhijie
    Huang, Chun-Hsi
    Al-Somani, Turki F.
    2015 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT), 2015, : 575 - 580
  • [38] Speedup Higher-Order Masking of AES sing Normal Basis and SIMD
    Miyajan, Abdulaziz
    Huang, Chun-Hsi
    Al-Somani, Turki F.
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2016, : 293 - 298
  • [39] Constant-time higher-order Boolean-to-arithmetic masking
    Hutter, Michael
    Tunstall, Michael
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2019, 9 (02) : 173 - 184
  • [40] Hiding Higher-Order Univariate Leakages by Shuffling Polynomial Masking Schemes
    De Santis, Fabrizio
    Bauer, Tobias
    Sigl, Georg
    PROCEEDINGS OF THE 2016 ACM WORKSHOP ON THE THEORY OF IMPLEMENTATION SECURITY (TIS'16), 2016, : 17 - 26