Side-Channel Evaluation Methodology on Software

被引:0
|
作者
Guilley, Sylvain [1 ,2 ]
Karray, Khaled [1 ]
Perianin, Thomas [3 ]
Shrivastwa, Ritu-Ranjan [1 ,2 ]
Souissi, Youssef [1 ]
Takarabt, Sofiane [1 ,2 ]
机构
[1] Secure IC SAS, F-75015 Paris, France
[2] Telecom ParisTech, F-91120 Palaiseau, France
[3] Secure IC KK, Chiyoda Ku, Hirakawa Cho, Tokyo 1020093, Japan
基金
欧盟地平线“2020”;
关键词
side-channel evaluation; cryptographic implementation; cybersecurity; AES; RSA;
D O I
10.3390/cryptography4040027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic implementations need to be robust amidst the widespread use of crypto-libraries and attacks targeting their implementation, such as side-channel attacks (SCA). Many certification schemes, such as Common Criteria and FIPS 140, continue without addressing side-channel flaws. Research works mostly tackle sophisticated attacks with simple use-cases, which is not the reality where end-to-end evaluation is not trivial. In this study we used all due diligence to assess the invulnerability of a given implementation from the shoes of an evaluator. In this work we underline that there are two kinds of SCA: horizontal and vertical. In terms of quotation, measurement and exploitation, horizontal SCA is easier. If traces are constant-time, then vertical attacks become convenient, since there is no need for specific alignment ("value based analysis"). We introduce our new methodology: Vary the key to select sensitive samples, where the values depend upon the key, and subsequently vary the mask to uncover unmasked key-dependent leakage, i.e., the flaws. This can be done in the source code (pre-silicon) for the designer or on the actual traces (post-silicon) for the test-lab. We also propose a methodology for quotations regarding SCA unlike standards that focus on only one aspect (like number of traces) and forgets about other aspects (such as equipment; cf. ISO/IEC 20085-1.
引用
收藏
页码:1 / 17
页数:17
相关论文
共 50 条
  • [1] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [2] Quantitative Evaluation of Side-channel Security
    Li, Huiyun
    Chen, Tingding
    Wu, Keke
    Yu, Fengqi
    [J]. 2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 456 - 460
  • [3] Design of a Set of Software Tools for Side-Channel Attacks
    Fuentes, A.
    Hernandez, L.
    Martin, A.
    Alarcos, B.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (06) : 1966 - 1978
  • [4] Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software
    Wichelmann, Jan
    Paetschke, Anna
    Wilke, Luca
    Eisenbarth, Thomas
    [J]. PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6789 - 6806
  • [5] Shielding Software From Privileged Side-Channel Attacks
    Dong, Xiaowan
    Shen, Zhuojia
    Criswell, John
    Cox, Alan L.
    Dwarkadas, Sandhya
    [J]. PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1441 - 1458
  • [6] μLeech: A Side-Channel Evaluation Platform for IoT
    Moukarzel, Michael
    Eisenbarth, Thomas
    Sunar, Berk
    [J]. 2017 IEEE 60TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2017, : 25 - 28
  • [7] ASCON hardware implementations and side-channel evaluation
    Gross, Hannes
    Wenger, Erich
    Dobraunig, Christoph
    Ehrenhoefer, Christoph
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2017, 52 : 470 - 479
  • [8] Leakage Assessment Methodology A Clear Roadmap for Side-Channel Evaluations
    Schneider, Tobias
    Moradi, Amir
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 495 - 513
  • [9] Formal Verification of Software Countermeasures against Side-Channel Attacks
    Eldib, Hassan
    Wang, Chao
    Schaumont, Patrick
    [J]. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2014, 24 (02)
  • [10] Survey on Software Side-channel Attacks in Trusted Execution Environment
    Yang, Fan
    Zhang, Qian-Ying
    Shi, Zhi-Ping
    Guan, Yong
    [J]. Ruan Jian Xue Bao/Journal of Software, 2023, 34 (01): : 381 - 403