leakage assessment methodology
play

Leakage Assessment Methodology - a clear roadmap for side-channel - PowerPoint PPT Presentation

Leakage Assessment Methodology - a clear roadmap for side-channel evaluations - 29. August 2015 Tobias Schneider & Amir Moradi Ruhr-Universitt Bochum Embedded Security Group Outline Motivation Statistical Background Testing


  1. Leakage Assessment Methodology - a clear roadmap for side-channel evaluations - 29. August 2015 Tobias Schneider & Amir Moradi Ruhr-Universität Bochum

  2. Embedded Security Group Outline  Motivation  Statistical Background  Testing Methodology  Higher ‐ Order Testing  Efficient Computation  Case Studies  Conclusion 2 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  3. Embedded Security Group Motivation • Security Evaluation • Attack ‐ based Testing • Information ‐ theoretic Testing • Testing based on t ‐ Test 3 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  4. Embedded Security Group Motivation ‐ Security Evaluation How secure is this chip? Problem: Evaluation is not trivial. Non ‐ Invasive Attack Testing Workshop, 2011 Goal: Establish testing methodology capable of robustly assessing the physical vulnerability of cryptographic devices. 4 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  5. Embedded Security Group Motivation ‐ Attack ‐ based Testing Perform state ‐ of ‐ the ‐ art attacks on the device under test (DUT) Attacks Intermediate Leakage Types: Values: Models: • DPA • Sbox In • HW • CPA • Sbox Out • HD • MIA • Sbox In/Out • Bit • … • … • … Problems: • High computational complexity • Requires lot of expertise • Does not cover all possible attack vectors 5 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  6. Embedded Security Group Motivation ‐ Information ‐ theoretic Testing Computation of Mutual/Perceived Information Problems: • High computational complexity • Cannot focus on one statistical moment • Dependent on PDF ‐ Estimation • Does not cover all possible attack vectors 6 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  7. Embedded Security Group Motivation ‐ Testing based on ‐ Test Tries to detect any type of leakage at a certain order • Proposed by CRI at NIST workshop Advantages: • Independent of architecture • Independent of attack model • Fast & simple • Versatile Problems: • No information about hardness of attack • Possible false positives if no care about evaluation setup 7 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  8. Embedded Security Group Motivation  In this talk: – (Hopefully) understandable explanation of the tests – Detailed explanation of how to conduct tests in higher ‐ orders – Discuss efficiency and accuracy problems and provide efficient and robust formulas – How to design an appropriate framework to host the DUT for such tests, including both software and hardware platforms (e.g., FPGA, µController) – Two case studies 8 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  9. Embedded Security Group Statistical Background • t ‐ Test 9 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  10. Embedded Security Group Statistical Background ‐ ‐ Test Sample � � Sample � � Null Hypothesis: Two population means are equal. 10 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  11. Embedded Security Group Statistical Background ‐ ‐ Test Sample � � Sample � � � � � � Sample mean: � � � � � � Sample variance: � � � � Sample size: � � � � � � � � � � � � t � � � � � � v � � ‐ test statistic Degree of freedom � � � � � � � � � � � � � � � � � � � � � � � � � � 1 � � � � 1 11 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  12. Embedded Security Group Statistical Background ‐ ‐ Test Γ � � 1 ���� 1 � � � Estimate the probability to accept null � 2 � �, � � hypothesis with Student’s � distribution: �� Γ � � 2 With probability density function: � � � 2 � � t, v �� |�| With cumulative density function: � � 2��� t , v� 12 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  13. Embedded Security Group Statistical Background ‐ ‐ Test  Small � values give evidence to reject the null hypothesis  For testing usually only the � ‐ value is estimated  Compared to a threshold of t � 4.5 • � � 2� �4.5, � � 1000 � 0.00001 • Confidence of > 0.99999 to reject null hypothesis 13 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  14. Embedded Security Group Testing Methodology • Specific ‐ Test • Non ‐ Specific t ‐ Test 14 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  15. Embedded Security Group Testing Methodology ‐ Specific ‐ Test Measurements � � ������ ��� � � � 0 ������ ��� � � � 1 With Associated Data � � � � � �  Test is conducted at each sample point separately (univariate)  Key is known to enable correct partitioning  If corresponding � ‐ test exceeds threshold ⇒ DPA probable 15 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  16. Embedded Security Group Testing Methodology ‐ Specific ‐ Test Measurements � � ������ ���� � � � � ������ ���� � � � � With Associated Data � � � � � �  Test is conducted at each sample point separately (univariate)  Key is known to enable correct partitioning  If corresponding � ‐ test exceeds threshold ⇒ DPA probable  Other classifications possible (e.g. Sbox output byte) 16 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  17. Embedded Security Group Testing Methodology ‐ Specific ‐ Test Example: PRESENT (first round)  addRoundKey, sBoxLayer, pLayer Bitwise: 3 � 64 tests  Sbox out bits (64 models) Nibblewise: 3 � 16 � 16 tests   Other tests possible Problems:  Sbox 0 nibble (16 models) Same as attack ‐ based approach  Many different intermediate values  Many different models  Prevents comprehensive evaluation Sbox �in ⊕ out� bits (64 models) 17 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  18. Embedded Security Group Testing Methodology ‐ Non ‐ Specific ‐ Test  fixed vs. random t ‐ test  Avoids being dependent on any intermediate value/model  Needs special measurement phase: Measurements � Measurements � � � With Random With Fixed Associated Data D � Associated Data D � � � � 18 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  19. Embedded Security Group Testing Methodology ‐ Non ‐ Specific ‐ Test Relation with specific t ‐ test: Specific t ‐ test Single ‐ bit intermediate value �  � ��� �� ��� Overall mean: � � if |� � | � |� � |  � ��� � ��� � Non ‐ specific t ‐ test Non ‐ specific t ‐ test with fixed D ��� with fixed D ��� � � � � � � � � � � � close to � ��� � � close to � ��� � �   � close to � � � close to � � �   19 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  20. Embedded Security Group Testing Methodology ‐ Non ‐ Specific ‐ Test  Non ‐ specific t ‐ test reports a detectable leakage ⇒ Specific t ‐ test reports leakage with higher confidence  Other direction ( ⇐ ) cannot be concluded from a single non ‐ specific t ‐ test  Recommended to perform a number of non ‐ specific tests with different fixed data D Semi ‐ fixed vs. random test:  Use a set of particular associated data � instead of D  All lead to certain intermediate value 20 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  21. Embedded Security Group Higher Order Testing • Univariate • Multivariate 21 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  22. Embedded Security Group Higher Order Testing ‐ Univariate  Sensitive variable is masked: � � � � ∘ � �  First ‐ order t ‐ test should not detect any leakage � �  Shares are often processed in parallel in hardware circuits  Traces need to be preprocessed  Univariate higher ‐ order testing: 2 nd ‐ order : � � � � � � (centralized)  � � � �� �  d ‐ order: (standardized) � � � � 22 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  23. Embedded Security Group Higher Order Testing ‐ Multivariate  Shares are often processed at different time instances in software implementations � �  Test need to consider a combination of multiple different points in time  Finding these Points ‐ of ‐ Interest (POI) is computationally complex  Different combination functions:  Centered product � � 2 nd ‐ order: � � � � � ⋅ � � � � �  23 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  24. Embedded Security Group Efficient Computation • Naïve • Incremental • Raw Moments • Central Moments • Multivariate • Parallelization 24 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

  25. Embedded Security Group Efficient Computation ‐ Naïve t � � � � � � � � � � � � � � � Reminder: � �  � � � �  � � � � � � � � � � � � , � � � � , � � Requires estimation of: � � : Naïve computation of �� � , � � � � � �� � � � �� � � � � � … � � : � First pass: � � � Second pass: � � Problem: Not efficient, especially for higher orders (preprocessing) 25 Sharif Uni. | Tehran | 29. August 2015 Amir Moradi

Recommend


More recommend