Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model Sebastian Faust, Vincent Grosso, Santos Merino Del Pozo, Clara Paglialonga, François-Xavier Standaert TU Darmstadt (Germany), Radbout University Nijmegen (The Netherlands), DarkMatter LLC (UAE), UCLouvain (Belgium) CHES 2018, Amsterdam, The Netherlands
Masking (e.g., Boolean π = π π + π π + β― + π π ) 1 π Noisy leakages security: π β MI (π;π΄) MI π; π΄ < MI π π ; π π π Goal (ideally):
Masking (e.g., Boolean π = π π + π π + β― + π π ) 1 Bounded moment security: π π π π 1 ,π 2 ,β¦,π πβ1 ( π -1)th order statistical moment (ideally) π Noisy leakages security: π β MI (π;π΄) MI π; π΄ < MI π π ; π π π Goal (ideally):
Masking (e.g., Boolean π = π π + π π + β― + π π ) 1 π¦ = π¦ 1 + π¦ 2 + β― + π¦ π Probing security: Sets of ( π -1) probes are of π (ideally) Bounded moment security: π π π π 1 ,π 2 ,β¦,π πβ1 ( π -1)th order statistical moment (ideally) π Noisy leakages security: π β MI (π;π΄) MI π; π΄ < MI π π ; π π π Goal (ideally):
Security reductions 2 abstract-qualitative π¦ = π¦ 1 + π¦ 2 + β― + π¦ π probing [Barthe et al., Eurocrypt 2017] bounded moment physical-qualitative [Duc et al., Eurocrypt 2014] physical-quantitative noisy leakages
What can go wrong? (e.g., when computing π. π ) 3 Issue #1. Lack of randomness (can break the independence assumption) π 1 π 1 π 1 π 1 π 2 π 1 π 3 Example: probing π 1 = π 1 . π 1 + π 2 + π 3 π 2 π 2 π 1 π 2 π 2 π 2 π 3 β reveals information on π (when π 1 = 1) π 3 π 3 π 1 π 3 π 2 π 3 π 3
What can go wrong? (e.g., when computing π. π ) 3 Issue #1. Lack of randomness (can break the independence assumption) β’ mitigated by adding π 1 π 1 π 1 π 1 π 2 π 1 π 3 0 π π 1 2 Β«refreshing gadgets Β» π 2 π 2 π 1 π 2 π 2 π 2 π 3 π 0 π + β 2 3 β’ can be analyzed in π 3 π π 0 π 3 π 1 π 3 π 2 π 3 π 3 2 3 the probing model
What can go wrong? (e.g., when computing π. π ) 3 Issue #1. Lack of randomness (can break the independence assumption) β’ mitigated by adding π 1 π 1 π 1 π 1 π 2 π 1 π 3 0 π π 1 2 Β«refreshing gadgets Β» π 2 π 2 π 1 π 2 π 2 π 2 π 3 π 0 π + β 2 3 β’ can be analyzed in π 3 π π 0 π 3 π 1 π 3 π 2 π 3 π 3 2 3 the probing model Issue #2. Physical defaults (can break the independence assumption) Example: glitches (transcient values) Β« re-combine Β» the shares such that: π π = π(π¦ 1 β π¦ 2 β π¦ 3 ) (detected in the bounded moment model)
What can go wrong? (e.g., when computing π. π ) 3 Issue #1. Lack of randomness (can break the independence assumption) β’ mitigated by adding π 1 π 1 π 1 π 1 π 2 π 1 π 3 0 π π 1 2 Β«refreshing gadgets Β» π 2 π 2 π 1 π 2 π 2 π 2 π 3 π 0 π + β 2 3 β’ can be analyzed in π 3 π π 0 π 3 π 1 π 3 π 2 π 3 π 3 2 3 the probing model Issue #2. Physical defaults (can break the independence assumption) β’ mitigated by adding a Β« non- completeness Β» property [ β Theshold Implementations] β’ abstract property: can be analyzed in the probing model!
Security notions (and scalability) 4 π -probing security [ISW, 2004] : any π -tuple of shares in the protected circuit is independent of any sensitive variable
Security notions (and scalability) 4 π -probing security [ISW, 2004] : any π -tuple of shares in the protected circuit is independent of any sensitive variable Problem: the cost of testing probing security increases (very) fast with circuit size and the # of shares (since β many tuples) [Barthe et al., Eurocrypt 2015]
Security notions (and scalability) 4 π 1 + π 2 β€ π π 1 internal probes π 2 output probes π -probing security [ISW, 2004] : any π -tuple of shares in the protected circuit is independent of any sensitive variable π -(Strong) Non Interference [Barthe et al., CCS 2016] : a circuit gadget (e.g., f 1 ) is NI (SNI) if any set of π 1 + π 2 probes can be simulated with at most π 1 + π 2 (only π 1 ) shares of each input D(input shares||probes) β D(input shares||simulation)
Security notions (and scalability) 4 π 1 + π 2 β€ π π 1 internal probes π 2 output probes π -probing security [ISW, 2004] : any π -tuple of shares in the protected circuit is independent of any sensitive variable π -(Strong) Non Interference [Barthe et al., CCS 2016] : a circuit gadget (e.g., f 1 ) is NI (SNI) if any set of π 1 + π 2 probes can be simulated with at most π 1 + π 2 (only π 1 ) shares of each input D(input shares||probes) β D(input shares||simulation)
Problem statement (simplified) 5 β’ Composable masking π 1 π 1 π 1 π 2 π 1 π 3 0 π π 1 2 schemes ignore physical π 2 π 1 π 2 π 2 π 2 π 3 π 0 π + 2 3 π 3 π 1 π 3 π 2 π 3 π 3 π π 0 defaults such as glitches 2 3
Problem statement (simplified) 5 β’ Composable masking π 1 π 1 π 1 π 2 π 1 π 3 0 π π 1 2 schemes ignore physical π 2 π 1 π 2 π 2 π 2 π 3 π 0 π + 2 3 π 3 π 1 π 3 π 2 π 3 π 3 π π 0 defaults such as glitches 2 3 β’ Treshold implementations y 1 x 1 f 1 mitigate glitches but are only proven βuniformβ y 2 x 2 f 2 ( β probing secure) y 3 x 3 f 3 β testing scales badly
Problem statement (simplified) 5 β’ Composable masking π 1 π 1 π 1 π 2 π 1 π 3 0 π π 1 2 schemes ignore physical π 2 π 1 π 2 π 2 π 2 π 3 π 0 π + 2 3 π 3 π 1 π 3 π 2 π 3 π 3 π π 0 defaults such as glitches 2 3 β’ Treshold implementations y 1 x 1 f 1 mitigate glitches but are only proven βuniformβ y 2 x 2 f 2 ( β probing secure) y 3 x 3 f 3 β testing scales badly β’ Design & prove masked implementations that are ( jointly! ) robust against glitches and composable
(Refined) model and security definition 6 π 1 Glitch-extended probes: probing any output of a combinatorial sub- circuit allows the adversary to observe all the sub-circuit inputs Example: π 1 gives π, π and π
(Refined) model and security definition 6 π 1 Glitch-extended probes: probing any output of a combinatorial sub- circuit allows the adversary to observe all the sub-circuit inputs Example: π 1 gives π, π and π π 2 Technical clarification : non-extended probes on the stable registersβ values have to be considered in the simulation too
(Refined) model and security definition 6 π 1 Glitch-extended probes: probing any output of a combinatorial sub- circuit allows the adversary to observe all the sub-circuit inputs Example: π 1 gives π, π and π π 2 Technical clarification : non-extended probes on the stable registersβ values have to be considered in the simulation too Definition: a gadget is glitch-robust π -SNI if it is π - SNI in the βglitch - extendedβ probing model
(Refined) model and security definition 6 π π Glitch-extended probes: probing any output of a combinatorial sub- circuit allows the adversary to observe all the sub-circuit inputs Example: π 1 gives π, π and π π 2 Technical clarification : non-extended probes on the stable registersβ values have to be considered in the simulation too Definition: a gadget is glitch-robust π -SNI if it is π - SNI in the βglitch - extendedβ probing model β Sharesβ fan in of robust gadgets should be minimum
(Refined) model and security definition 6 π π Glitch-extended probes: probing any output of a combinatorial sub- circuit allows the adversary to observe all the sub-circuit inputs Example: π 1 gives π, π and π π π Technical clarification : non-extended probes on the stable registersβ values have to be considered in the simulation too Definition: a gadget is glitch-robust π -SNI if it is π - SNI in the βglitch - extendedβ probing model β Sharesβ fan in of robust gadgets should be minimum β Outputs of SNI gadgets should be stored in registers
ISW mult. is glitch-robust π -SNI in 2 cycles 7 Example with: β’ π = 3 β’ π = 2
ISW mult. is glitch-robust π -SNI in 2 cycles 7 The adversary can observe: β’ 12 glitch-extended probes β’ π£ π,π βs and π π βs β’ 3 stable (output) probes π π βs β We need to describe a simulator using π 1 shares/input
ISW mult. is glitch-robust π -SNI in 2 cycles 7 β’ 1 st example: 2 extended probes β’ G( π£ 1,2 ) β π 1 , π 2 , π 1,2 β’ G π 1 β π£ 1,1 , π£ 2,1 , π£ 3,1 to simul. with 2 shares/input
Recommend
More recommend