threshold implementations comprehend and apply
play

Threshold Implementations: Comprehend and Apply Svetla Nikova, KU - PowerPoint PPT Presentation

Outline Preliminaries Comprehend the TI Applying TI Conclusion Threshold Implementations: Comprehend and Apply Svetla Nikova, KU Leuven, Belgium July 4rd, 2013 1 / 97 Outline Preliminaries Comprehend the TI Applying TI Conclusion


  1. Outline Preliminaries Comprehend the TI Applying TI Conclusion Threshold Implementations: Comprehend and Apply Svetla Nikova, KU Leuven, Belgium July 4rd, 2013 1 / 97

  2. Outline Preliminaries Comprehend the TI Applying TI Conclusion Preliminaries Side-channel attacks Countermeasures Masking Glitches Comprehend the TI What is TI? Notations, Definitions and Proofs Uniformity Affine Equivalence Classes Applying TI Sharing Techniques Decomposing small S-boxes HW implementations small S-boxes HW implementations AES Conclusion 2 / 97

  3. Outline Preliminaries Comprehend the TI Applying TI Conclusion Preliminaries Side-channel attacks Countermeasures Masking Glitches Comprehend the TI What is TI? Notations, Definitions and Proofs Uniformity Affine Equivalence Classes Applying TI Sharing Techniques Decomposing small S-boxes HW implementations small S-boxes HW implementations AES Conclusion 3 / 97

  4. Outline Preliminaries Comprehend the TI Applying TI Conclusion Side-channel attacks • Normal attacks: c = E ( k , p ) • Known plaintext: equations in the key • High nonlinearity, difficult to solve • Device executing the cryptographic algorithm leaks information on internal state • Instantaneous leakage depends on intermediate variables, which results in equations • That have lower nonlinearity • That may contain noise 4 / 97

  5. Outline Preliminaries Comprehend the TI Applying TI Conclusion Countering power attacks • Ensure constant power consumption • Constant instruction sequence • Use special hardware logic styles • Avoid statistical correlation between secret key and data processed • Masking • Counters attacks that use repeated measurements and statistics to remove the noise 5 / 97

  6. Outline Preliminaries Comprehend the TI Applying TI Conclusion Countermeasures at different levels • Hardware logic style → Relieves cryptographers BUT places burden on hardware designers • Algorithms and implementations → Probably lowest feasible level • Ciphers and Protocols → New standards, takes time 6 / 97

  7. Outline Preliminaries Comprehend the TI Applying TI Conclusion Countermeasures We NEED secure implementations against DPA 7 / 97

  8. Outline Preliminaries Comprehend the TI Applying TI Conclusion Countermeasures We NEED secure implementations against DPA • Hardware countermeasures • Balancing power consumption [Tiri et al., CHES’03] • · · · • Masking • Masking intermediate values [Chari et al., CRYPTO’99; Goubin et al., CHES’99] • Threshold Implementations [Nikova et al., ICISC’08] • Shamir’s Secret Sharing [Goubin et al., CHES’11; Prouff et al., CHES’11] • · · · • Leakage-Resilient Crypto Problem: Unfeasible circuit size, glitches 8 / 97

  9. Outline Preliminaries Comprehend the TI Applying TI Conclusion Countermeasures We NEED secure implementations against DPA • Hardware countermeasures • Balancing power consumption [Tiri et al., CHES’03] • · · · • Masking • Masking intermediate values [Chari et al., CRYPTO’99; Goubin et al., CHES’99] • Threshold Implementations [Nikova et al., ICISC’08] • Shamir’s Secret Sharing [Goubin et al., CHES’11; Prouff et al., CHES’11] • · · · • Leakage-Resilient Crypto Problem: Unfeasible circuit size, glitches 9 / 97

  10. Outline Preliminaries Comprehend the TI Applying TI Conclusion Masking Randomized redundant representation: v → ( v 1 , . . . , v n ) such that v = v 1 ∗ . . . ∗ v n n -th order masking: all n − 1 intermediate variables are independent of v The adversary needs to identify n leakage samples and combine their information Boolean masking: v 1 = v ⊕ m , v 2 = m Multiplicative masking (zero-value problem): v 1 = v ∗ m , v 2 = m Affine Masking: v 1 = v ∗ m ⊕ m 2 , v 2 = m 1 , v 3 = m 2 10 / 97

  11. Outline Preliminaries Comprehend the TI Applying TI Conclusion Masking in Software Masking Table Look-Ups Two tables have to be computed T and T m , where T m ( v ⊕ m ) = T ( v ) ⊕ m Consequences: the computational effort and amount of memory increases. 11 / 97

  12. Outline Preliminaries Comprehend the TI Applying TI Conclusion Problems with masking • Unintentional unmasking, • Glitches HD ( v m , w m ) = HW ( v m ⊕ w m ) = HW ( v ⊕ w ) 12 / 97

  13. Outline Preliminaries Comprehend the TI Applying TI Conclusion Glitches Temporary states of the output 13 / 97

  14. Outline Preliminaries Comprehend the TI Applying TI Conclusion Glitches Temporary states of the output z = x AND y , where x m = x ⊕ m x , y m = y ⊕ m y z m = x m y m ⊕ ( m y x m ⊕ ( m x y m ⊕ ( m x m y ⊕ m z ))) 14 / 97

  15. Outline Preliminaries Comprehend the TI Applying TI Conclusion Glitches Temporary states of the output z = x AND y , where x m = x ⊕ m x , y m = y ⊕ m y z m = x m y m ⊕ ( m y x m ⊕ ( m x y m ⊕ ( m x m y ⊕ m z ))) 15 / 97

  16. Outline Preliminaries Comprehend the TI Applying TI Conclusion Glitches Temporary states of the output z = x AND y , where x m = x ⊕ m x , y m = y ⊕ m y z m = x m y m ⊕ ( m y x m ⊕ ( m x y m ⊕ ( m x m y ⊕ m z ))) 16 / 97

  17. Outline Preliminaries Comprehend the TI Applying TI Conclusion Glitches Temporary states of the output z = x AND y , where x m = x ⊕ m x , y m = y ⊕ m y z m = x m y m ⊕ ( m y x m ⊕ ( m x y m ⊕ ( m x m y ⊕ m z ))) y m y y m AND XOR 0 0 0 0 0 0 1 1 2 2 1 0 1 1 1 1 1 0 1 2 17 / 97

  18. Outline Preliminaries Comprehend the TI Applying TI Conclusion Why TI? Threshold Implementations • Any hardware technology • Realistic size • Provably secure against 1 st order DPA 18 / 97

  19. Outline Preliminaries Comprehend the TI Applying TI Conclusion Why TI? Threshold Implementations • Any hardware technology • Realistic size • Provably secure against 1 st order DPA So far, • Noekeon [Nikova et al., ICISC’08] • Multiplication in GF (4) [Nikova et al., ICISC’08] • Keccak [Bertoni et al., SHA-3 candidates’10] • Present [Poschmann et al., J.Cryptology’11] • AES [Moradi et al., Eurocrypt’11] • All 3 × 3 and 4 × 4 S-boxes [Bilgin et al., CHES’12] • etc. 19 / 97

  20. Outline Preliminaries Comprehend the TI Applying TI Conclusion Preliminaries Side-channel attacks Countermeasures Masking Glitches Comprehend the TI What is TI? Notations, Definitions and Proofs Uniformity Affine Equivalence Classes Applying TI Sharing Techniques Decomposing small S-boxes HW implementations small S-boxes HW implementations AES Conclusion 20 / 97

  21. Outline Preliminaries Comprehend the TI Applying TI Conclusion What is TI? S() ( x, y, z, . . . ) ( a, b, c, . . . ) 21 / 97

  22. Outline Preliminaries Comprehend the TI Applying TI Conclusion What is TI? S 1 ( x 1 , y 1 , z 1 , . . . ) ( a 1 , b 1 , c 1 , . . . ) ( x 2 , y 2 , z 2 , . . . ) ( a 2 , b 2 , c 2 , . . . ) S 2 . . . . . . . . . S s ( x s , y s , z s , . . . ) ( a s , b s , c s , . . . ) 22 / 97

  23. Outline Preliminaries Comprehend the TI Applying TI Conclusion What is TI? S 1 ( x 1 , y 1 , z 1 , . . . ) ( a 1 , b 1 , c 1 , . . . ) ( x 2 , y 2 , z 2 , . . . ) S 2 ( a 2 , b 2 , c 2 , . . . ) . . . . . . . . . S s ( x s , y s , z s , . . . ) ( a s , b s , c s , . . . ) • Non-complete 23 / 97

  24. Outline Preliminaries Comprehend the TI Applying TI Conclusion What is TI? S 1 ( x 1 , y 1 , z 1 , . . . ) ( a 1 , b 1 , c 1 , . . . ) ⊕ ⊕ ( x 2 , y 2 , z 2 , . . . ) S 2 ( a 2 , b 2 , c 2 , . . . ) ⊕ ⊕ . . . . . . . . . ⊕ ⊕ S s ( x s , y s , z s , . . . ) ( a s , b s , c s , . . . ) = = ( a, b, c, . . . ) ( x, y, z, . . . ) • Correct • Non-complete 24 / 97

  25. Outline Preliminaries Comprehend the TI Applying TI Conclusion What is TI? S 1 ( x 1 , y 1 , z 1 , . . . ) ( a 1 , b 1 , c 1 , . . . ) ⊕ ⊕ ( x 2 , y 2 , z 2 , . . . ) S 2 ( a 2 , b 2 , c 2 , . . . ) ⊕ ⊕ . . . . . . . . . ⊕ ⊕ S s ( x s , y s , z s , . . . ) ( a s , b s , c s , . . . ) = = ( a, b, c, . . . ) ( x, y, z, . . . ) • Correct • Non-complete • Uniform 25 / 97

  26. Outline Preliminaries Comprehend the TI Applying TI Conclusion Uniformity • S-boxes: If S ( x ) = a is a bijection, then S ( x 1 , x 2 , x 3 ) = ( a 1 , a 2 , a 3 ) is also a bijection. 26 / 97

  27. Outline Preliminaries Comprehend the TI Applying TI Conclusion Uniformity • S-boxes: If S ( x ) = a is a bijection, then S ( x 1 , x 2 , x 3 ) = ( a 1 , a 2 , a 3 ) is also a bijection. • Multiplication: x y a=x AND y a (0,0,0) (0,0,1) (0,1,0) (0,1,1) (1,0,0) (1,0,1) (1,1,0) (1,1,1) 0 0 0 0 4 0 0 4 0 4 4 0 0 1 0 0 4 0 0 4 0 4 4 0 1 0 0 0 4 0 0 4 0 4 4 0 1 1 1 1 0 4 4 0 4 0 0 4 0 12 0 0 12 0 12 12 0 1 0 4 4 0 4 0 0 4 27 / 97

  28. Outline Preliminaries Comprehend the TI Applying TI Conclusion Uniform Masking and Non-completeness Let x ∈ F m denote the input of the (unshared) function f . Let X be correct and uniform masking of x i.e. X ∈ Sh ( x ), and F be a sharing of f . 28 / 97

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend