leakage assessment methodology
play

Leakage Assessment Methodology - a clear roadmap for side-channel - PowerPoint PPT Presentation

Leakage Assessment Methodology - a clear roadmap for side-channel evaluations - Tobias Schneider and Amir Moradi Wednesday, September 16 th , 2015 Motivation Security Evaluation Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 2


  1. Leakage Assessment Methodology - a clear roadmap for side-channel evaluations - Tobias Schneider and Amir Moradi Wednesday, September 16 th , 2015

  2. Motivation Security Evaluation Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 2

  3. Motivation Security Evaluation Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 3

  4. Motivation Security Evaluation Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 4

  5. Motivation Security Evaluation Does the chip leak information? Problem: Evaluation is not trivial. Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 5

  6. Motivation Security Evaluation Does the chip leak information? Problem: Evaluation is not trivial. Non-Invasive Attack Testing Workshop, 2011 Goal: Establish testing methodology capable of robustly assessing the physical vulnerability of cryptographic devices. Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 6

  7. Motivation Attack-based Testing Perform state-of-the-art attacks on the device under test (DUT) Attacks Intermediate Leakage Types: Values: Models: • DPA • Sbox In • HW × × • CPA • Sbox Out • HD • MIA • Sbox In/Out • Bit • … • … • … Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 7

  8. Motivation Attack-based Testing Perform state-of-the-art attacks on the device under test (DUT) Attacks Intermediate Leakage Types: Values: Models: • DPA • Sbox In • HW × × • CPA • Sbox Out • HD • MIA • Sbox In/Out • Bit • … • … • … Problems: • High computational complexity • Requires lot of expertise • Does not cover all possible attack vectors Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 8

  9. Motivation Testing based on t -Test Tries to detect any type of leakage at a certain order • Proposed by CRI at NIST workshop Advantages: • Independent of architecture • Independent of attack model • Fast & simple • Versatile Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 9

  10. Motivation Testing based on t -Test Tries to detect any type of leakage at a certain order • Proposed by CRI at NIST workshop Advantages: • Independent of architecture • Independent of attack model • Fast & simple • Versatile Problems: • No information about hardness of attack • Possible false positives if no care about evaluation setup Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 10

  11. Contribution 1. Explain statistical background in a (hopefully) more understandable way 2. More detailed discussion of higher-order testing 3. Hints how to design fast & correct measurement setup 4. Optimization of analysis phase Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 11

  12. Statistical Background • t -Test Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 12

  13. Statistical Background t -Test Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 13

  14. Statistical Background t -Test Sample 𝑅 0 Sample 𝑅 1 Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 14

  15. Statistical Background t -Test Sample 𝑅 0 Sample 𝑅 1 Null Hypothesis: Two population means are equal. Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 15

  16. Statistical Background t -Test Sample 𝑅 0 Sample 𝑅 1 Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 16

  17. Statistical Background t -Test Sample 𝑅 0 Sample 𝑅 1 𝜈 1 𝜈 0 Sample mean: 2 2 𝑡 1 𝑡 0 Sample variance: 𝑜 1 𝑜 0 Sample size: Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 17

  18. Statistical Background t -Test Sample 𝑅 0 Sample 𝑅 1 𝜈 1 𝜈 0 Sample mean: 2 2 𝑡 1 𝑡 0 Sample variance: 𝑜 1 𝑜 0 Sample size: 2 2 2 𝑜 0 + 𝑡 1 𝑡 0 𝑜 1 t = 𝜈 0 − 𝜈 1 v = 𝑢 -test statistic Degree of freedom 2 2 2 2 𝑡 0 𝑡 1 2 2 𝑜 0 + 𝑡 1 𝑡 0 𝑜 0 𝑜 1 𝑜 1 𝑜 0 − 1 + 𝑜 1 − 1 Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 18

  19. Statistical Background t -Test 𝑢 𝑤 Γ 𝑤 + 1 −𝑤+1 1 + 𝑢 2 2 Estimate the probability to accept null 2 𝑔 𝑢, 𝑤 = 𝜌𝑤 Γ 𝑤 hypothesis with Student’s 𝑢 distribution: 𝑤 2 ∞ 𝑞 = 2 𝑔 t, v 𝑒𝑢 Compute: |𝑢| Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 19

  20. Statistical Background t -Test 𝑢 𝑤 Γ 𝑤 + 1 −𝑤+1 1 + 𝑢 2 2 Estimate the probability to accept null 2 𝑔 𝑢, 𝑤 = 𝜌𝑤 Γ 𝑤 hypothesis with Student’s 𝑢 distribution: 𝑤 2 ∞ 𝑞 = 2 𝑔 t, v 𝑒𝑢 Compute: |𝑢| Small 𝑞 values give evidence to reject the null hypothesis Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 20

  21. Statistical Background t -Test  For testing usually only the 𝑢 -value is estimated  Compared to a threshold of t > 4.5 • 𝑞 = 2𝐺 −4.5, 𝑤 > 1000 < 0.00001 • Confidence of > 0.99999 to reject the null hypothesis Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 21

  22. Testing Methodology Specific 𝒖 -Test • • Non-Specific t -Test Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 22

  23. Testing Methodology Specific t -Test Measurements 𝑈 𝑗 With Associated Data 𝐸 𝑗 Specific t -Test:  Key is known to enable correct partitioning  Test is conducted at each sample point separately (univariate)  If corresponding 𝑢 -test exceeds threshold ⇒ DPA probable Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 23

  24. Testing Methodology Specific t -Test Measurements 𝑈 𝑗 𝑢𝑏𝑠𝑕𝑓𝑢 𝑐𝑗𝑢 𝐸 𝑗 = 0 With Associated Data 𝐸 𝑗 𝑅 0 Specific t -Test:  Key is known to enable correct partitioning  Test is conducted at each sample point separately (univariate)  If corresponding 𝑢 -test exceeds threshold ⇒ DPA probable Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 24

  25. Testing Methodology Specific t -Test Measurements 𝑈 𝑗 𝑢𝑏𝑠𝑕𝑓𝑢 𝑐𝑗𝑢 𝐸 𝑗 = 0 𝑢𝑏𝑠𝑕𝑓𝑢 𝑐𝑗𝑢 𝐸 𝑗 = 1 With Associated Data 𝐸 𝑗 𝑅 0 𝑅 1 Specific t -Test:  Key is known to enable correct partitioning  Test is conducted at each sample point separately (univariate)  If corresponding 𝑢 -test exceeds threshold ⇒ DPA probable Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 25

  26. Testing Methodology Non-Specific t -Test Non-Specific t -Test:  fixed vs. random t -test  Avoids being dependent on any intermediate value/model  Detected leakage of single test is not always exploitable  Semi-fixed vs. random t- test useful in certain cases Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 26

  27. Testing Methodology Non-Specific t -Test Non-Specific t -Test:  fixed vs. random t -test  Avoids being dependent on any intermediate value/model  Detected leakage of single test is not always exploitable  Semi-fixed vs. random t- test useful in certain cases Measurements 𝑈 𝑘 With Fixed Associated Data D 𝑅 0 Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 27

  28. Testing Methodology Non-Specific t -Test Non-Specific t -Test:  fixed vs. random t -test  Avoids being dependent on any intermediate value/model  Detected leakage of single test is not always exploitable  Semi-fixed vs. random t- test useful in certain cases Measurements 𝑈 Measurements 𝑈 𝑗 𝑘 With Random With Fixed Associated Data D 𝑗 Associated Data D 𝑅 0 𝑅 1 Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 28

  29. Higher-Order Testing • Multivariate • Univariate Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 29

  30. Higher-Order Testing Multivariate Multivariate:  Sensitive variable is shared: 𝑇 = 𝑇 1 ∘ 𝑇 2  Shares are processed at different time instances (SW)  Leakages at different time instances need to be combined first Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 30

  31. Higher-Order Testing Multivariate 𝑇 1 Multivariate:  Sensitive variable is shared: 𝑇 = 𝑇 1 ∘ 𝑇 2  Shares are processed at different time instances (SW)  Leakages at different time instances need to be combined first Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 31

  32. Higher-Order Testing Multivariate 𝑇 1 𝑇 2 Multivariate:  Sensitive variable is shared: 𝑇 = 𝑇 1 ∘ 𝑇 2  Shares are processed at different time instances (SW)  Leakages at different time instances need to be combined first Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 32

  33. Higher-Order Testing Multivariate 𝑇 1 𝑇 2 Multivariate:  Sensitive variable is shared: 𝑇 = 𝑇 1 ∘ 𝑇 2  Shares are processed at different time instances (SW)  Leakages at different time instances need to be combined first Centered Product: 𝑦′ = 𝑦 1 − 𝜈 1 ⋅ 𝑦 2 − 𝜈 2 Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 33

  34. Higher-Order Testing Univariate 𝑇 1 𝑇 2 Univariate:  Shares are processed in parallel (HW)  Leakages at the same time instance need to be combined first Leakage Assessment Methodology | CHES 2015 | Tobias Schneider 34

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend