Table Recomputation-Based Higher-Order Masking Against Horizontal Attacks

被引:1
|
作者
Guo, Zhipeng [1 ,2 ]
Tang, Ming [1 ,2 ]
Prouff, Emmanuel [3 ]
Luo, Maixing [1 ,2 ]
Yan, Fei [1 ,2 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Grp SAFRAN, F-75724 Paris, France
基金
中国国家自然科学基金;
关键词
Higher-order masking; horizontal side-channel attacks (HSCAs); side channel analysis (SCA); table recomputation-based countermeasure;
D O I
10.1109/TCAD.2018.2883900
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Masking is a class of well-known countermeasure against side-channel analysis by employing the idea of secret sharing. The theoretical security proof model of higher-order masking was initiated by Ishai, Sahai, and Wagner, and Barthe et al. pushed forward it by proposing a more refine security definition named as t-SNI security. In CHES 2016, a new attack called horizontal side-channel attacks (HSCAs) came forward and successfully broke the Rivain-Prouff countermeasure, which has been proved to satisfy the t-SNI security. It presents a dilemma: instead of more secure, masking with higher-order may be more vulnerable due to the HSCA. Although there already exists an effective countermeasure for the Rivain-Prouff scheme, it is quite difficult to apply this method in the table recomputation-based higher-order masking schemes, such as the scheme introduced by Coron in EUROCRYPT 2014. To fill this gap, we propose a new table recomputation-based higher-order masking scheme, named as table compression masking (TCM) scheme. While meeting the t-SNI security, our new countermeasure is also secure against the HSCA. We give the formal security proof under the t-SNI security definition, as well as a heuristic security analysis considering the HSCA. Our analysis shows that, by dividing the full lookup table into many distinct parts and shifting them by refreshed shares, the same share will never be manipulated for more than twice in TCM scheme. This feature gives a heuristic security against HSCA. To our best knowledge, our countermeasure is the first solution for table recomputation-based higher-order masking to resist HSCA.
引用
收藏
页码:34 / 44
页数:11
相关论文
共 50 条
  • [41] Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
    Roy, Arnab
    Vivek, Srinivas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2013, 2013, 8086 : 417 - 434
  • [42] Improved Higher-Order Differential Attacks on MISTY1
    Bar-On, Achiya
    FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 28 - 47
  • [43] Leak Point Locating in Hardware Implementations of Higher-Order Masking Schemes
    Tang Ming
    Li Yanbin
    Zhao Dongyan
    Li Yuguang
    Yan Fei
    Zhang Huanguo
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (12) : 3008 - 3019
  • [44] Constant-time higher-order Boolean-to-arithmetic masking
    Michael Hutter
    Michael Tunstall
    Journal of Cryptographic Engineering, 2019, 9 : 173 - 184
  • [45] maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults
    Barthe, Gilles
    Belaid, Sonia
    Cassiers, Gaetan
    Fouque, Pierre-Alain
    Gregoire, Benjamin
    Standaert, Francois-Xavier
    COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 300 - 318
  • [46] A Fast and Provably Secure Higher-Order Masking of AES S-Box
    Kim, HeeSeok
    Hong, Seokhie
    Lim, Jongin
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 95 - 107
  • [47] IPM-RED: combining higher-order masking with robust error detection
    Keren, Osnat
    Polian, Ilia
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2021, 11 (02) : 147 - 160
  • [48] A pre-silicon logic level security verification flow for higher-order masking schemes against glitches on FPGAs
    Li, Yanbin
    Tang, Ming
    Li, Yuguang
    Zhang, Huanguo
    INTEGRATION-THE VLSI JOURNAL, 2020, 70 : 60 - 69
  • [49] PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations
    Kim, Hangi
    Jeon, Yongjin
    Kim, Giyoon
    Kim, Jongsung
    Sim, Bo-Yeon
    Han, Dong-Guk
    Seo, Hwajeong
    Kim, Seonggyeom
    Hong, Seokhie
    Sung, Jaechul
    Hong, Deukjo
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2020, 2021, 12593 : 99 - 122
  • [50] IPM-RED: combining higher-order masking with robust error detection
    Osnat Keren
    Ilia Polian
    Journal of Cryptographic Engineering, 2021, 11 : 147 - 160