random probing security
play

Random Probing Security Verification, Composition, Expansion and New - PowerPoint PPT Presentation

Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Random Probing Security Verification, Composition, Expansion and New Constructions Sonia Belad 1 , Jean-Sbastien Coron 2 Emmanuel


  1. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Random Probing Security Verification, Composition, Expansion and New Constructions Sonia Belaïd 1 , Jean-Sébastien Coron 2 Emmanuel Prouff 3 , Matthieu Rivain 1 and Abdul Rahman Taleb 1 1 CryptoExperts, France 2 University of Luxembourg 3 ANSSI, France August 7, 2020 S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 1 / 20

  2. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Side-Channel Attacks S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 2 / 20

  3. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Side-Channel Attacks S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 2 / 20

  4. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Countermeasure Higher-order Masking Sensitive variable x , group ( G , ⋆ ) : S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 3 / 20

  5. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Countermeasure Higher-order Masking Sensitive variable x , group ( G , ⋆ ) : x = x 0 ⋆ . . . ⋆ x n − 2 ⋆ x n − 1 � �� � ���� S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 3 / 20

  6. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Countermeasure Higher-order Masking Sensitive variable x , group ( G , ⋆ ) : x = x 0 ⋆ . . . ⋆ x n − 2 ⋆ x n − 1 � �� � ���� uniformly at random from G S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 3 / 20

  7. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Countermeasure Higher-order Masking Sensitive variable x , group ( G , ⋆ ) : x = x 0 ⋆ . . . ⋆ x n − 2 ⋆ x n − 1 � �� � ���� x ⋆ x 0 ··· ⋆ x n − 2 uniformly at random from G S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 3 / 20

  8. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Countermeasure Higher-order Masking Sensitive variable x , group ( G , ⋆ ) : x = x 0 ⋆ . . . ⋆ x n − 2 ⋆ x n − 1 � �� � ���� x ⋆ x 0 ··· ⋆ x n − 2 uniformly at random from G Security of masking schemes? S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 3 / 20

  9. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Leakage Models Definitions Convenient Realistic

  10. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Leakage Models Definitions Convenient t -probing model t leaking variables Realistic

  11. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Leakage Models Definitions Convenient t -probing model t leaking variables Random probing model each variable leaks with proba. p Realistic

  12. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Leakage Models Definitions Convenient t -probing model t leaking variables Random probing model each variable leaks with proba. p Noisy Leakage model noisy leakage of all the variables Realistic S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 4 / 20

  13. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Leakage Models Existing Works S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 5 / 20

  14. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Leakage Models Existing Works • Reduction property [Duc et al., 2014] Random Probing Noisy Leakage Probing Security = ⇒ = ⇒ Security Security S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 5 / 20

  15. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Leakage Models Existing Works • Reduction property [Duc et al., 2014] Random Probing Noisy Leakage Probing Security = ⇒ = ⇒ Security Security Random Probing Constructions: S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 5 / 20

  16. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Leakage Models Existing Works • Reduction property [Duc et al., 2014] Random Probing Noisy Leakage Probing Security = ⇒ = ⇒ Security Security Random Probing Constructions: • [Ajtai, 2011, Andrychowicz et al., 2016] based on expander graphs S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 5 / 20

  17. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Leakage Models Existing Works • Reduction property [Duc et al., 2014] Random Probing Noisy Leakage Probing Security = ⇒ = ⇒ Security Security Random Probing Constructions: • [Ajtai, 2011, Andrychowicz et al., 2016] based on expander graphs • [Ananth et al., 2018] based on secure multi-party computa- � tions O ( | C | . poly ( κ )) for a circuit C , tolerated leakage proba. ≈ 2 − 25 � . S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 5 / 20

  18. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Random Probing Model Contributions S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 6 / 20

  19. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Random Probing Model Contributions • VRAPS Tool : (V)erifier of (RA)ndom (P)robing (S)ecurity. S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 6 / 20

  20. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Random Probing Model Contributions • VRAPS Tool : (V)erifier of (RA)ndom (P)robing (S)ecurity. • Random probing composability / expandability for global security level amplification (inspired from [Ananth et al., 2018]). S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 6 / 20

  21. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Random Probing Model Contributions • VRAPS Tool : (V)erifier of (RA)ndom (P)robing (S)ecurity. • Random probing composability / expandability for global security level amplification (inspired from [Ananth et al., 2018]). • Efficient instantiation from base gadgets in O ( | C | .κ 7 . 5 ) tolerating leakage probability ≈ 2 − 8 . S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 6 / 20

  22. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Random Probing Security Definition ( p , ǫ ) -Random Probing Security p || p p × r p p p + p + + Add × Mult. || Copy r Random

  23. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Random Probing Security Definition ( p , ǫ ) -Random Probing Security p W set of wires || p p × r p p p + p + + Add × Mult. Failure Probability ǫ || Copy r Random S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 7 / 20

  24. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Random Probing Security Definition ( p , ǫ ) -Random Probing Security p W set of wires || p p × r p p p Independent from secret inputs ? + p + + Add × Mult. Failure Probability ǫ || Copy r Random S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 7 / 20

  25. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Random Probing Security Definition ( p , ǫ ) -Random Probing Security p W set of wires || p p × r p p p Independent from secret inputs ? + yes p no + + Add × Mult. Failure Probability ǫ || Copy r Random S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 7 / 20

  26. Introduction Random Probing Security Random Probing Composability Random Probing Expandability Conclusion Random Probing Security Definition ( p , ǫ ) -Random Probing Security p W set of wires || p p × r p p p Independent from secret inputs ? + yes p no + Simulation Success + Add × Mult. Failure Probability ǫ || Copy r Random S. Belaid, JS. Coron, E. Prouff, M. Rivain, A. Taleb Random Probing Security 7 / 20

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend