Masking Proofs are Tight
(and How to Exploit it in Security Evaluations) Vincent Grosso, FranΓ§ois-Xavier Standaert
Radbout University Nijmegen (The Netherlands), UCL (Belgium)
EUROCRYPT 2018, Tel Aviv, Israel
Masking Proofs are Tight (and How to Exploit it in Security - - PowerPoint PPT Presentation
Masking Proofs are Tight (and How to Exploit it in Security Evaluations) Vincent Grosso, Franois-Xavier Standaert Radbout University Nijmegen (The Netherlands), UCL (Belgium) EUROCRYPT 2018, Tel Aviv, Israel Motivation (side-channel security
Masking Proofs are Tight
(and How to Exploit it in Security Evaluations) Vincent Grosso, FranΓ§ois-Xavier Standaert
Radbout University Nijmegen (The Netherlands), UCL (Belgium)
EUROCRYPT 2018, Tel Aviv, Israel
Motivation (side-channel security evaluation)
attack-based evaluations
computation πππ 220 210 measurements 2128 264 20
current practice
(simplified)
1
Motivation (side-channel security evaluation)
attack-based evaluations
computation πππ 220 210 measurements 2128 264 20 > πππ = πππ? = πππ?
current practice
(simplified)
1
Motivation (side-channel security evaluation)
attack-based evaluations proof-based evaluations
(Kerckhoffs)
computation computation πππ 220 210 measurements 2128 264 20 computation 2128 264 20 πππ 260 230 measurements
proposed approach current practice
(simplified)
1
Example: masked encoding
π§ = π§ 1 β π§ 2 β β― β π§(π β 1) β π§(π)
?
2
Example: masked encoding
π§ = π§ 1 β π§ 2 β β― β π§(π β 1) β π§(π)
?
2
Example: masked encoding
π§ = π§ 1 β π§ 2 β β― β π§(π β 1) β π§(π)
y
2
Example: masked encoding
?
π§ = π§ 1 β π§ 2 β β― β π§(π β 1) β π§(π)
2
Example: masked encoding
π§ = π§ 1 β π§ 2 β β― β π§(π β 1) β π§(π)
noise and independence
(Duc, Dziemb., Faust 2014)
2
Example: masked encoding
π§ = π§ 1 β π§ 2 β β― β π§(π β 1) β π§(π)
π β
π
MI(π;π΄) and MI(π, π΄) < MI(π(π), π΄(π))π noise and independence
(Duc, Dziemb., Faust 2014)
2
Contributions
encodings (Duc, Faust, Standaert, EC15/JoC18)
3
Contributions
encodings (Duc, Faust, Standaert, EC15/JoC18)
from simple gadgets (e.g., add. & mult.)
3
Contributions
encodings (Duc, Faust, Standaert, EC15/JoC18)
from simple gadgets (e.g., add. & mult.)
3
Outline
w.c. eval. time complexity
Outline
w.c. eval. time complexity
Evaluation settings (I)
4
Evaluation settings (I)
4
leakage matrix (all leaks) leakage vector (one π-tuple) leakage sample (one share)
Evaluation settings (I)
4
Evaluation settings (I)
ππβs become π2-tuples - or even 2π2-tuples (log/alog tables) 4
π1π1 π1π2 π1π3 π2π1 π2π2 π2π3 π3π1 π3π2 π3π3 + π
1
π
2
βπ
1
π
3
βπ
2
π
3
β π1 π2 π3 partial products refreshing compression
Evaluation settings (I)
ππβs become π2-tuples - or even 2π2-tuples (log/alog tables)
2, SNR = π2(8βbit HW) ππ
2
= 2
ππ
2
4
Evaluation settings (II)
MI πΏ; π, π΄ = H πΏ +
π
Pr[π] β
π¦
Pr π¦ β
π
Pr[π§] β
π
Pr π π, π¦, π β log2(Pr π π¦, π )
shares vectors β π(2π) π-dimension integral
5
Outline
w.c. eval. time complexity
Case #1
6
Case #1
6
Case #1
π,
ππ) 6
Case #1
6
Case #2
7
Case #2
π,
ππ) < MI(π
π(π),
ππ(π))π [DFS15,18] 7
Case #2
7
Case #3
8
Case #3
8
Case #4: putting things together (I)
9
π(π),
ππ(π))π β π β MI(π
π(π), ππ(π))π
Case #4: putting things together (I)
9
Case #4: putting things together (I)
9
Case #4: putting things together (II)
10
π1π1 π1π2 π1π3 π2π1 π2π2 π2π3 π3π1 π3π2 π3π3
ππ(π)βs & increases MI exp. in π
Case #4: putting things together (II)
10
ππ(π)βs & increases MI exp. in π
π(π),
ππ(π))π β (π β MI(π
π(π), ππ(π)))π
Case #4: putting things together (II)
10
ππ(π)βs & increases MI exp. in π
Case #4: putting things together (II)
10
ππ(π)βs & increases MI exp. in π
Case #4: putting things together (II)
10
Link to the bigger picture
bound on the attackβs overall complexity
11
Outline
w.c. eval. time complexity
From evaluations to attacks
12
From evaluations to attacks
12
Examples:
(Battistello et al., CHES16)
propagation (this paper)
Outline
w.c. eval. time complexity
Conclusions (I)
bounds based on the wide-trail strategy
13
Conclusions (I)
bounds based on the wide-trail strategy
implementations (this paper β one step in this direction) 13
Conclusions (I)
bounds based on the wide-trail strategy
implementations (this paper β one step in this direction)
masked AES implementation at CHES 2017
13
Conclusions (II)
14
Conclusions (II)
14
Conclusions (II)
14
Conclusions (II)
implies and exponential security loss!
14
http://perso.uclouvain.be/fstandae/