Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
- M. Medwed, F.-X. Standaert, A. Joux
NXP & UCL Crypto Group & Univ. Versailles CHES 2012, Leuven, Belgium
Towards Super-Exponential Side-Channel Security with Efficient - - PowerPoint PPT Presentation
Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs M. Medwed, F.-X. Standaert , A. Joux NXP & UCL Crypto Group & Univ. Versailles CHES 2012, Leuven, Belgium SCA security (implementation level) 1 SCA
Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
NXP & UCL Crypto Group & Univ. Versailles CHES 2012, Leuven, Belgium
SCA security (implementation level) 1
SCA security (mathametical level) 1
Limitations of current approaches 1
Direction for improvements #1 1
Direction for improvements #2 1
This work: leakage-resilient PRFs 2
symmetric cryptography (see Goldreich’s book)
This work: leakage-resilient PRFs 2
symmetric cryptography (see Goldreich’s book)
Secure – in what sense? 3
increases linearly with the noise variance
exponentially with the number of masks
(e.g. leakage of shares must be independent)
Secure – in what sense? 3
increases linearly with the noise variance
exponentially with the number of masks
(e.g. leakage of shares must be independent)
Outline
Outline
Tree-based PRF (GGM 86)
4
Tree-based PRF (GGM 86)
4
Tree-based PRF (GGM 86)
4
Tree-based PRF (GGM 86)
4
Tree-based PRF (GGM 86)
4 : 2-bounded data complexity : 128 AES per 128-bit input
Efficiency / security tradeoff 5
: 16 AES per 128-bit input : 256-bounded data complexity?
Outline
Is bounded data complexity enough? 6
Is bounded data complexity enough? 6
Is bounded data complexity enough? 6
Possible security improvements 7
Possible security improvements 7
the data complexity (i.e. prevent averaging)
Possible security improvements 7
the data complexity (i.e. prevent averaging)
Outline
Algorithmic noise (standard DPA) 8
Algorithmic noise (standard DPA) 8
Algorithmic noise (standard DPA) 8
Random pi’s => divide & conquer attacks 9
Random pi’s => divide & conquer attacks 9
Random pi’s => divide & conquer attacks 9
Single S-box attack results
10
Single S-box attack results
10
Outline
Our tweak: carefully chosen plaintexts (I) 11
Our tweak: carefully chosen plaintexts (I) 11
Our tweak: carefully chosen plaintexts (I) 11
e.g. CPA + HW model: same predictions for 16 key bytes
Our tweak: carefully chosen plaintexts (II) 12
=> Divide & conquer attacks hardly apply
Our tweak: carefully chosen plaintexts (II) 12
=> Divide & conquer attacks hardly apply
(roughly) identical for all S-boxes
also identical for all S-boxes
Our tweak: carefully chosen plaintexts (II) 12
=> Divide & conquer attacks hardly apply
(roughly) identical for all S-boxes
also identical for all S-boxes
key bytes are rated in the first Ns positions by DPA, it remains to enumerate Ns! Permutations
Single S-box attack results 13
Single S-box attack results
13
Outline
Worst case security evaluations (I) 14
to analyze the security of our tweaked design => We considered two alternatives considering noiseless traces as a first-step investigation
Worst case security evaluations (I) 14
to analyze the security of our tweaked design => We considered two alternatives considering noiseless traces as a first-step investigation
key from the actual leakage traces
Worst case security evaluations (II) 15
for Np plaintexts is a vectorial knapsack problem => We used LLL as a black box for solving it
Worst case security evaluations (II) 15
for Np plaintexts is a vectorial knapsack problem => We used LLL as a black box for solving it
Outline
Main question 16
Main question 16
Main question 16
Main question 16
Can we exploit different leakage models? 17
Can we exploit different leakage models? 17
Can we exploit different leakage models? 17
Main message: the key-dependent algorithmic noise remains hard to exploit
Outline
Conclusions (I) 18
Remember back in the days…
Conclusions (I) 18
Remember back in the days… We thought masking was “secure”
Conclusions (I) 18
Remember back in the days… We thought masking was “secure” Then came HO attacks,
Conclusions (I) 18
Remember back in the days… We thought masking was “secure” Then came HO attacks, Then came glitches,
Conclusions (I) 18
Remember back in the days… We thought masking was “secure” Then came HO attacks, Then came glitches, Then came early propagation,
Conclusions (I) 18
Remember back in the days… We thought masking was “secure” Then came HO attacks, Then came glitches, Then came early propagation, Then came coupling, …
Conclusions (I) 18
Remember back in the days… We thought masking was “secure” Then came HO attacks, Then came glitches, Then came early propagation, Then came coupling, … Yet, masking remains one of the frequently used solutions to protect HW and SW implementations!
Conclusions (II) 19
A similar situation probably holds for leakage resilience
Conclusions (II) 19
A similar situation probably holds for leakage resilience
Conclusions (II) 19
A similar situation probably holds for leakage resilience
Conclusions (II) 19
A similar situation probably holds for leakage resilience
Conclusions (II) 19
A similar situation probably holds for leakage resilience
We expect that secure & efficient PRFs (e.g. with 16 or 32 block cipher executions per 128-bit input) exist !!
http://perso.uclouvain.be/fstandae/