leakage assessment methodology
play

Leakage Assessment Methodology - a clear roadmap for side-channel - PowerPoint PPT Presentation

Leakage Assessment Methodology - a clear roadmap for side-channel evaluations - 29. August 2015 Tobias Schneider & Amir Moradi Ruhr-Universitt Bochum Embedded Security Group Outline Motivation Statistical Background Testing


  1. Leakage Assessment Methodology - a clear roadmap for side-channel evaluations - 29. August 2015 Tobias Schneider & Amir Moradi Ruhr-Universität Bochum

  2. Embedded Security Group Outline  Motivation  Statistical Background  Testing Methodology  Higher ‐ Order Testing  Efficient Computation  Case Studies  Conclusion 2 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  3. Embedded Security Group Motivation • Security Evaluation • Attack ‐ based Testing • Information ‐ theoretic Testing • Testing based on t ‐ Test 3 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  4. Embedded Security Group Motivation ‐ Security Evaluation How secure is this chip? Problem: Evaluation is not trivial. Non ‐ Invasive Attack Testing Workshop, 2011 Goal: Establish testing methodology capable of robustly assessing the physical vulnerability of cryptographic devices. 4 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  5. Embedded Security Group Motivation ‐ Attack ‐ based Testing Perform state ‐ of ‐ the ‐ art attacks on the device under test (DUT) Attacks Intermediate Leakage Types: Values: Models: • DPA • Sbox In • HW • CPA • Sbox Out • HD • MIA • Sbox In/Out • Bit • … • … • … Problems: • High computational complexity • Requires lot of expertise • Does not cover all possible attack vectors 5 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  6. Embedded Security Group Motivation ‐ Information ‐ theoretic Testing Computation of Mutual/Perceived Information Problems: • High computational complexity • Cannot focus on one statistical moment • Dependent on PDF ‐ Estimation • Does not cover all possible attack vectors 6 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  7. Embedded Security Group Motivation ‐ Testing based on ‐ Test Tries to detect any type of leakage at a certain order • Proposed by CRI at NIST workshop Advantages: • Independent of architecture • Independent of attack model • Fast & simple • Versatile Problems: • No information about hardness of attack • Possible false positives if no care about evaluation setup 7 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  8. Embedded Security Group Motivation  In this talk: – (Hopefully) understandable explanation of the tests – Detailed explanation of how to conduct tests in higher ‐ orders – Discuss efficiency and accuracy problems and provide efficient and robust formulas – How to design an appropriate framework to host the DUT for such tests, including both software and hardware platforms (e.g., FPGA, µController) – Two case studies 8 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  9. Embedded Security Group Statistical Background • t ‐ Test 9 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  10. Embedded Security Group Statistical Background ‐ ‐ Test Sample � � Sample � � Null Hypothesis: Two population means are equal. 10 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  11. Embedded Security Group Statistical Background ‐ ‐ Test Sample � � Sample � � � � � � Sample mean: � � � � � � Sample variance: � � � � Sample size: � � � � � � � � � � � � t � � � � � � v � � ‐ test statistic Degree of freedom � � � � � � � � � � � � � � � � � � � � � � � � � � 1 � � � � 1 11 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  12. Embedded Security Group Statistical Background ‐ ‐ Test Γ � � 1 ���� 1 � � � Estimate the probability to accept null � 2 � �, � � hypothesis with Student’s � distribution: �� Γ � � 2 With probability density function: � � � 2 � � t, v �� |�| With cumulative density function: � � 2��� t , v� 12 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  13. Embedded Security Group Statistical Background ‐ ‐ Test  Small � values give evidence to reject the null hypothesis  For testing usually only the � ‐ value is estimated  Compared to a threshold of t � 4.5 • � � 2� �4.5, � � 1000 � 0.00001 • Confidence of > 0.99999 to reject null hypothesis 13 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  14. Embedded Security Group Testing Methodology • Specific ‐ Test • Non ‐ Specific t ‐ Test 14 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  15. Embedded Security Group Testing Methodology ‐ Specific ‐ Test Measurements � � ������ ��� � � � 0 ������ ��� � � � 1 With Associated Data � � � � � �  Test is conducted at each sample point separately (univariate)  Key is known to enable correct partitioning  If corresponding � ‐ test exceeds threshold ⇒ DPA probable 15 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  16. Embedded Security Group Testing Methodology ‐ Specific ‐ Test Measurements � � ������ ���� � � � � ������ ���� � � � � With Associated Data � � � � � �  Test is conducted at each sample point separately (univariate)  Key is known to enable correct partitioning  If corresponding � ‐ test exceeds threshold ⇒ DPA probable  Other classifications possible (e.g. Sbox output byte) 16 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  17. Embedded Security Group Testing Methodology ‐ Specific ‐ Test Example: PRESENT (first round)  addRoundKey, sBoxLayer, pLayer Bitwise: 3 � 64 tests  Sbox out bits (64 models) Nibblewise: 3 � 16 � 16 tests   Other tests possible Problems:  Sbox 0 nibble (16 models) Same as attack ‐ based approach  Many different intermediate values  Many different models  Prevents comprehensive evaluation Sbox �in ⊕ out� bits (64 models) 17 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  18. Embedded Security Group Testing Methodology ‐ Non ‐ Specific ‐ Test  fixed vs. random t ‐ test  Avoids being dependent on any intermediate value/model  Needs special measurement phase: Measurements � Measurements � � � With Random With Fixed Associated Data D � Associated Data D � � � � 18 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  19. Embedded Security Group Testing Methodology ‐ Non ‐ Specific ‐ Test Relation with specific t ‐ test: Specific t ‐ test Single ‐ bit intermediate value �  � ��� �� ��� Overall mean: � � if |� � | � |� � |  � ��� � ��� � Non ‐ specific t ‐ test Non ‐ specific t ‐ test with fixed D ��� with fixed D ��� � � � � � � � � � � � close to � ��� � � close to � ��� � �   � close to � � � close to � � �   19 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  20. Embedded Security Group Testing Methodology ‐ Non ‐ Specific ‐ Test  Non ‐ specific t ‐ test reports a detectable leakage ⇒ Specific t ‐ test reports leakage with higher confidence  Other direction ( ⇐ ) cannot be concluded from a single non ‐ specific t ‐ test  Recommended to perform a number of non ‐ specific tests with different fixed data D Semi ‐ fixed vs. random test:  Use a set of particular associated data � instead of D  All lead to certain intermediate value 20 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  21. Embedded Security Group Higher Order Testing • Univariate • Multivariate 21 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  22. Embedded Security Group Higher Order Testing ‐ Univariate  Sensitive variable is masked: � � � � ∘ � �  First ‐ order t ‐ test should not detect any leakage � �  Shares are often processed in parallel in hardware circuits  Traces need to be preprocessed  Univariate higher ‐ order testing: 2 nd ‐ order : � � � � � � (centralized)  � � � �� �  d ‐ order: (standardized) � � � � 22 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  23. Embedded Security Group Higher Order Testing ‐ Multivariate  Shares are often processed at different time instances in software implementations � �  Test need to consider a combination of multiple different points in time  Finding these Points ‐ of ‐ Interest (POI) is computationally complex  Different combination functions:  Centered product � � 2 nd ‐ order: � � � � � ⋅ � � � � �  23 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  24. Embedded Security Group Efficient Computation • Naïve • Incremental • Raw Moments • Central Moments • Multivariate • Parallelization 24 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  25. Embedded Security Group Efficient Computation ‐ Naïve t � � � � � � � � � � � � � � � Reminder: � �  � � � �  � � � � � � � � � � � � , � � � � , � � Requires estimation of: � � : Naïve computation of �� � , � � � � � �� � � � �� � � � � � … � � : � First pass: � � � Second pass: � � Problem: Not efficient, especially for higher orders (preprocessing) 25 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend