formal analysis of the entropy security trade off in
play

Formal Analysis of the Entropy / Security Trade-off in First-Order - PowerPoint PPT Presentation

Introduction RSM: Rotating Sboxes Masking Information Theoretic Evaluation of RSM Security Evaluation of RSM against CPA and 2O-CPA Conclusions and Perspectives Formal Analysis of the Entropy / Security Trade-off in First-Order Masking


  1. Introduction RSM: Rotating Sboxes Masking Information Theoretic Evaluation of RSM Security Evaluation of RSM against CPA and 2O-CPA Conclusions and Perspectives Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks Maxime Nassar, Sylvain Guilley and Jean-Luc Danger Bull TrustWay, Rue Jean Jaur` es, B.P. 68, 78 340 Les Clayes-sous-Bois, France. Institut TELECOM / TELECOM ParisTech, 46 rue Barrault, 75 634 Paris Cedex, France. Secure-IC S.A.S., 80 avenue des Buttes de Co¨ esmes, 35700 Rennes, France. Sylvain Guilley, < sylvain.guilley@TELECOM-ParisTech.fr > Entropy / Security Trade-off | INDOCRYPT’2011 | 1

  2. Introduction RSM: Rotating Sboxes Masking Information Theoretic Evaluation of RSM Security Evaluation of RSM against CPA and 2O-CPA Conclusions and Perspectives Introduction 1 Side-Channel Analysis (SCA) Countermeasures Goal of the Presentation RSM: Rotating Sboxes Masking 2 Rationale of the Countermeasure RSM Modelization Information Theoretic Evaluation of RSM 3 Security Evaluation of RSM against CPA and 2O-CPA 4 Optimal HO-CPA Expression of ρ (1 , 2) opt Conclusions and Perspectives 5 Sylvain Guilley, < sylvain.guilley@TELECOM-ParisTech.fr > Entropy / Security Trade-off | INDOCRYPT’2011 | 2

  3. Introduction RSM: Rotating Sboxes Masking Side-Channel Analysis (SCA) Information Theoretic Evaluation of RSM Countermeasures Security Evaluation of RSM against CPA and 2O-CPA Goal of the Presentation Conclusions and Perspectives Introduction 1 Side-Channel Analysis (SCA) Countermeasures Goal of the Presentation RSM: Rotating Sboxes Masking 2 Rationale of the Countermeasure RSM Modelization Information Theoretic Evaluation of RSM 3 Security Evaluation of RSM against CPA and 2O-CPA 4 Optimal HO-CPA Expression of ρ (1 , 2) opt Conclusions and Perspectives 5 Sylvain Guilley, < sylvain.guilley@TELECOM-ParisTech.fr > Entropy / Security Trade-off | INDOCRYPT’2011 | 3

  4. Side-channel measurement cryptographic Encryption system requests containing a secret key 0110100010010010011 Energy on-duty Timing reference

  5. Side-channel measurement Encryption requests Energy Timing reference

  6. Electromagnetic probe I/Os: USB socket Power supply Ground Trigger probe

  7. Introduction RSM: Rotating Sboxes Masking Side-Channel Analysis (SCA) Information Theoretic Evaluation of RSM Countermeasures Security Evaluation of RSM against CPA and 2O-CPA Goal of the Presentation Conclusions and Perspectives Protection against side-channel attacks Extrinsic countermeasures Noise addition . . makes the attack difficult but not impossible Internal powering . . . . . . . . . . . . . . . . . . . . .can be tampered with Internal countermeasures Make the power constant . . require design skills [DGBN09] ✖ Masking the power . . . . . . . . . . . . . . . susceptible to HO-SCA ✔ Sylvain Guilley, < sylvain.guilley@TELECOM-ParisTech.fr > Entropy / Security Trade-off | INDOCRYPT’2011 | 7

  8. Introduction RSM: Rotating Sboxes Masking Side-Channel Analysis (SCA) Information Theoretic Evaluation of RSM Countermeasures Security Evaluation of RSM against CPA and 2O-CPA Goal of the Presentation Conclusions and Perspectives Security Evaluation of Countermeasures Off-the-shelf platforms, e.g. the Smart-SIC Analyzer Sylvain Guilley, < sylvain.guilley@TELECOM-ParisTech.fr > Entropy / Security Trade-off | INDOCRYPT’2011 | 8

  9. Introduction RSM: Rotating Sboxes Masking Side-Channel Analysis (SCA) Information Theoretic Evaluation of RSM Countermeasures Security Evaluation of RSM against CPA and 2O-CPA Goal of the Presentation Conclusions and Perspectives Context + Security � = ⇒ + Costs � Trade-offs? Maximal security within a given budget Minimal spendings for a target security level (CC EALx?) Formal analysis: sound and realistic metrics for both security and cost. Sylvain Guilley, < sylvain.guilley@TELECOM-ParisTech.fr > Entropy / Security Trade-off | INDOCRYPT’2011 | 9

  10. Introduction RSM: Rotating Sboxes Masking Side-Channel Analysis (SCA) Information Theoretic Evaluation of RSM Countermeasures Security Evaluation of RSM against CPA and 2O-CPA Goal of the Presentation Conclusions and Perspectives Context − Costs � = ⇒ − Security � Trade-offs? Maximal security within a given budget Minimal spendings for a target security level (CC EALx?) Formal analysis: sound and realistic metrics for both security and cost. Sylvain Guilley, < sylvain.guilley@TELECOM-ParisTech.fr > Entropy / Security Trade-off | INDOCRYPT’2011 | 9

  11. Introduction RSM: Rotating Sboxes Masking Rationale of the Countermeasure Information Theoretic Evaluation of RSM RSM Modelization Security Evaluation of RSM against CPA and 2O-CPA Conclusions and Perspectives Introduction 1 Side-Channel Analysis (SCA) Countermeasures Goal of the Presentation RSM: Rotating Sboxes Masking 2 Rationale of the Countermeasure RSM Modelization Information Theoretic Evaluation of RSM 3 Security Evaluation of RSM against CPA and 2O-CPA 4 Optimal HO-CPA Expression of ρ (1 , 2) opt Conclusions and Perspectives 5 Sylvain Guilley, < sylvain.guilley@TELECOM-ParisTech.fr > Entropy / Security Trade-off | INDOCRYPT’2011 | 10

  12. Introduction RSM: Rotating Sboxes Masking Rationale of the Countermeasure Information Theoretic Evaluation of RSM RSM Modelization Security Evaluation of RSM against CPA and 2O-CPA Conclusions and Perspectives Masking with two (or more) paths Message k i IP IP Left Left Right Right masked mask mask masked data ( L i ) ( ML i ) ( MR i ) data ( R i ) Feistel function f m m ′ P S’ E x m S ( x ⊕ k c ) P S E ⊕ m ′ k c FP Ciphertext Sylvain Guilley, < sylvain.guilley@TELECOM-ParisTech.fr > Entropy / Security Trade-off | INDOCRYPT’2011 | 11 This operation is costly in general [SRQ06], especially for the

  13. Introduction RSM: Rotating Sboxes Masking Rationale of the Countermeasure Information Theoretic Evaluation of RSM RSM Modelization Security Evaluation of RSM against CPA and 2O-CPA Conclusions and Perspectives Masking with one path: Z → Z ⊕ M (ex. AES) Pool of masks Base masks M 0 − 15 MC(SR( M i )) ⊕ M i MMS 0 − 15 SR( M i ) MS 0 − 15 1280 bytes InvMC(InvSR( M i )) ⊕ M i IMMS 0 − 15 InvSR( M i ) IMS 0 − 15 Homomorphic computation. This masking is the less costly in the litterature [NGDS12]. Requires leak-free ROMs (well suited for ASIC & FPGA). Sylvain Guilley, < sylvain.guilley@TELECOM-ParisTech.fr > Entropy / Security Trade-off | INDOCRYPT’2011 | 12

  14. Introduction RSM: Rotating Sboxes Masking Rationale of the Countermeasure Information Theoretic Evaluation of RSM RSM Modelization Security Evaluation of RSM against CPA and 2O-CPA Conclusions and Perspectives Performances Table: Implementation results for reference and protected AES Unprotected RSM Overhead Number of ALUTs (%) 2136 (8%) 2734 (10%) 28% Number of M4K ROM Blocs (%) 20 (14%) 24 (17%) 20% Frequency (MHz) 133 88 34% Setting: n = 8 bit, 16 masks only, and (Price metric) provable security up to 2nd-order attacks (Security metric) Sylvain Guilley, < sylvain.guilley@TELECOM-ParisTech.fr > Entropy / Security Trade-off | INDOCRYPT’2011 | 13

  15. Introduction RSM: Rotating Sboxes Masking Rationale of the Countermeasure Information Theoretic Evaluation of RSM RSM Modelization Security Evaluation of RSM against CPA and 2O-CPA Conclusions and Perspectives RSM mode of operation SB ′ 0 128 4 Barrel shifter j ∈ { 0 − 15 } S ′ S ′ S ′ 0 1 15 m 0 m 1 m 15 M 0 . . . SubBytes SubBytes SubBytes m 1 m 2 m 0 M 1 Barrel shifter j ∈ { 0 − 15 } 4 128 Sylvain Guilley, < sylvain.guilley@TELECOM-ParisTech.fr > Entropy / Security Trade-off | INDOCRYPT’2011 | 14

  16. Introduction RSM: Rotating Sboxes Masking Rationale of the Countermeasure Information Theoretic Evaluation of RSM RSM Modelization Security Evaluation of RSM against CPA and 2O-CPA Conclusions and Perspectives RSM leakage Masked sboxes Z �→ M out ⊕ S ( Z ⊕ M in ). L ( Z , M ) = L ( Z ⊕ M ) . In this expression, Z and M are n -bit vectors, i.e. live in F n 2 . The leakage function L : F n 2 → R depends on the hardware. In a conservative perspective, L is assumed to be bijective. In a realistic perspective, L is assumed to non-injective. Sylvain Guilley, < sylvain.guilley@TELECOM-ParisTech.fr > Entropy / Security Trade-off | INDOCRYPT’2011 | 15

  17. Introduction RSM: Rotating Sboxes Masking Rationale of the Countermeasure Information Theoretic Evaluation of RSM RSM Modelization Security Evaluation of RSM against CPA and 2O-CPA Conclusions and Perspectives Metrics 1 Cost : Card[ M ] ∈ { 1 , · · · , 2 n } . 2 Security : Leakage: mutual information. Attack: resistance against HO-CPA. Modelization that bridges both notions: � 1 / Card[ M ] if m ∈ M , and P[ M = m ] = 0 otherwise. Sylvain Guilley, < sylvain.guilley@TELECOM-ParisTech.fr > Entropy / Security Trade-off | INDOCRYPT’2011 | 16

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend