correlation immune boolean functions and counter measures
play

Correlation-immune Boolean functions and counter-measures to side - PowerPoint PPT Presentation

Correlation-immune Boolean functions and counter-measures to side channel attacks Claude Carlet LAGA, Universities of Paris 8 and Paris 13, CNRS, France Work in common with Sylvain Guilley, Telecom Paris Tech, France Outline Correlation


  1. Correlation-immune Boolean functions and counter-measures to side channel attacks Claude Carlet LAGA, Universities of Paris 8 and Paris 13, CNRS, France Work in common with Sylvain Guilley, Telecom Paris Tech, France

  2. Outline ◮ Correlation immune functions in the framework of stream ciphers ◮ Side Channel Attacks and their counter-measures ◮ How Boolean functions play a new role in this framework ◮ New questions on correlation-immune Boolean functions 1

  3. Correlation immune functions in the framework of stream ciphers Synchronous stream ciphers : K K Pseudo-random generator Pseudo-random generator keystream keystream plain text ⊕ cipher text cipher text ⊕ plain text public channel 2

  4. Every pseudo-random generator (PRG) consists in a linear part (for efficiency) and a nonlinear part (for robustness). Boolean functions f : F n 2 → F 2 are often used in the nonlinear part. A classical theoretical model for their use combines the outputs of several Linear Feedback Shift Registers (LFSR) : 3

  5. Linear feedback shift registers : � � � c 1 c N − 1 c N s i + N s i + N − 1 s i +1 s i · · · s i = � N j =1 c j s i − j . 4

  6. The combiner model : x 1 LFSR 1 x 2 keystream s i LFSR 2 f . . . x n LFSR n Several attacks exist on this model, among which a divide and conquer attack called the Siegenthaler correlation attack. To withstand it, f must have no correlation with any subset of at most m variables, where m is as high as possible. 5

  7. Equivalently, the output distribution of f should not change when at most m input variables are fixed. We say then that f is correlation-immune of order m ( m -CI). Characterization by the Walsh transform (Xiao-Massey) : � ( − 1) f ( x )+ a · x = 0 , 2 , 1 ≤ w H ( a ) ≤ m ⇒ � ∀ a ∈ F n f( a ) = x ∈ F n 2 where w H is the Hamming weight : w H ( a ) = card { i = 1 , . . . , n / a i = 1 } . 6

  8. Characterization by (nonlinear) codes : the code C equal to the support { ( x ∈ F n 2 | f ( x ) = 1 } of f has dual distance at least d + 1 . Recall : given a code C ⊆ F n 2 , the distance enumerator of C is � 1 X n − d H ( u,v ) Y d H ( u,v ) . D C ( X, Y ) = card ( C ) ( u,v ) ∈ C 2 The dual distance of C is the minimal nonzero degree of the mono- mials with nonzero coefficients in D C ( X + Y, X − Y ) . Third characterization : the | C | × n array of all elements of C is an orthogonal array (with no repetition) of strength d . 7

  9. Weakness of CI functions for stream ciphers : The algebraic degree of a function is the degree of its Algebraic Normal Form (ANF) �� � � f ( x 1 , · · · , x n ) = a I x i . i ∈ I I ⊆{ 1 ,...,n } Correlation immune functions have low algebraic degrees : deg ( f ) ≤ n − m. They are then weak against : 8

  10. - the Berlekamp-Massey attack - complexity roughly quadratic in L deg ( f ) , where L is the average size of the LFSRs, � � nL - the Ronjom-Helleseth attack - complexity linear in , deg ( f ) - the fast algebraic attack, whose complexity depends on the existence of low degree functions g � = 0 and h such that fg = h and can be very low when f has not high algebraic degree. Constructing functions satisfying a weakened notion of correlation immunity (C.C.-Guillot-Mesnager) and allowing resistance to all at- tacks is an open problem. Consequence : another model is preferred : the filter model. 9

  11. Filter model ⊕ ⊕ ⊕ LFSR x 1 x 2 x n · · · f keystream s i In this model, correlation immunity is not necessary at order > 1 . 10

  12. End of the story for correlation-immune functions ? 11

  13. Side Channel Attacks and their counter-measures The implementation of cryptographic algorithms in devices like smart cards, FPGA or ASIC leaks information on the data, leading to side channel attacks (SCA). This information can be traces of electromagnetic emanations, power consumption, ... SCA are very powerful if countermeasures are not included in the implementation of the cryptosystems, since they can use information on the data implemented inside the algorithm. 12

  14. The attacker model is a grey box model instead of the black box model. Block ciphers are particularly vulnerable to SCA because the first round (given the plaintext), or the last round (given the ciphertext) can be more easily attacked, its diffusion being not yet complete. A sensitive variable is chosen in the algorithm, whose value is supposed to be stored in a register and to depend on the plaintext and on a few key bits. The emanations from the register are measured. They disclose a noisy version of a value related to the sensitive variable. 13

  15. A statistical method finds then the value of the key bits which optimizes the correlation between the traces and a modeled leakage . The original implementation of the AES can be attacked this way in a few seconds with a few traces. 14

  16. 15

  17. Counter-measures fortunately exist . Most common : mask each sensitive variable Z by splitting it. • 2 shares : Z ⊕ M � M , where M is drawn at random. � � Z ⊕ M M Joint leakage L ! For going through boxes : 16

  18. n bits n bits Initial values of simultaneous Z ⊕ M M leakage L the registers a b ( algorithm iterations ) n bits Z M Combinational glitch-free logic C R ( e.g. memory) Z ′ M ′ n bits a ′ b ′ Final values of Z ′ ⊕ M ′ M ′ the registers 17

  19. This has a cost. In software applications (smart cards), it can multiply by more than 20 the execution time when glitches are not handled (more if glitches are handled). An AES runs in 3629 cycles without masking and in 100 000 with masking. The program executable file size is also increased because all the rest of the computations on Z need to be modified into computations on Z + M and M . In hardware applications (ASIC, FPGA), the implementation area is roughly tripled. 18

  20. The counter-measure of masking with a single mask (i.e. two shares) cannot resist higher order SCA . Higher order SCA consist in combining the leakages of several variables (in multivariate attacks) or, since this is often not possible, to raise the leakage at higher powers (in higher order monovariate attacks). A second-order SCA is efficient on a single mask, but more expensive. • d -th order masking allows then resisting d -th order SCA : d + 1 shares : M 1 , . . . , M d are chosen at random and M d +1 = Z ⊕ M 1 , · · · ⊕ M d . 19

  21. As in secret sharing, Z is hidden in d + 1 shares M i , such that : – Z is a deterministic function of all the M i , but – Z is independent of ( M i ) i ∈ I if | I | � d . The cost in terms of running time and of memory is quadratic in d (cubic if the counter-measure must also deal with glitches). The attack complexity is exponential in the order : O ( V d ) , where V is the variance of the noise (indeed, raising the leakage at the d -th power raises the noise at the d -th power). But the implementation (including masking) must be efficient today while the SCA can be performed in the future. 20

  22. How Boolean functions play a new role in this framework ◮ Leakage squeezing A setup similar to coding in digital communications, but where the goal is to make it hard for the receiver to decode the signal. First order : 21

  23. n bits n bits Initial values of simultaneous Z ⊕ M F ( M ) leakage L the registers a b ( algorithm iterations ) F − 1 n bits Z M Combinational glitch-free logic C R ( e.g. memory) Z ′ M ′ n bits F a ′ b ′ Final values of Z ′ ⊕ M ′ F ( M ′ ) the registers 22

  24. Second order : n bits n bits n bits Initial values of simultaneous Z ⊕ M 1 ⊕ M 2 F 1 ( M 1 ) F 2 ( M 2 ) leakage L the registers a b c F − 1 F − 1 ( algorithm iterations ) 1 2 n bits M 2 Z M 1 Combinational n bits glitch-free logic C R 1 R 2 n bits ( e.g. memory) Z ′ M ′ 2 M ′ 1 n bits F 1 F 2 a ′ b ′ c ′ Final values of Z ′ ⊕ M ′ 1 ⊕ M ′ F 1 ( M ′ 1 ) F 2 ( M ′ 2 ) the registers 2 23

  25. Attacks (on second-order leakage squeezing) : Defense: counter-measure (Side)-Channel Attack Masking = Non-injective Information retrieval and noisy + Encoding Sharing “decoding Z ” leakage (exhaustive search) Shares: Registers: function [device under attack] Sensitive 1) Measure L S 0 S 0 variable: 2) Compute L i L Z S 1 w H F 1 ( S 1 ) 3) Test: ? Var [ E [ L i | Z ]] � = 0 S 2 F 2 ( S 2 ) N (0 , σ 2 ) i : order of the attack (increasing efficiency, increasing complexity). 24

  26. Efficiency of leakage-squeezing for first-order : Theorem The first-order leakage squeezing counter-measure with a permutation F resists the attack of order d if and only if : � ( − 1) b · F ( x )+ a · x = 0 , ∀ a, b ∈ F n 2 , 1 ≤ w H ( a ) + w H ( b ) ≤ d ⇒ x ∈ F n 2 that is, the indicator (characteristic function) of the graph G F = { ( x, F ( x ) , x ∈ F n 2 } of F is d -CI. 25

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend