Back to Search Start Over

Random Probing Security: Verification, Composition, Expansion and New Constructions

Authors :
Sonia Belaïd
Abdul Rahman Taleb
Matthieu Rivain
Emmanuel Prouff
Jean-Sébastien Coron
CryptoExperts
University of Luxembourg [Luxembourg]
Agence nationale de la sécurité des systèmes d'information (ANSSI)
Polynomial Systems (PolSys)
LIP6
Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)
This work is partly supported by the French FUI-AAP25 VeriSiCC project.
Source :
Advances in Cryptology-CRYPTO}2020-40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part I, Advances in Cryptology – CRYPTO 202040th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part I, CRYPTO 2020-40th Annual International Cryptology Conference, CRYPTO 2020-40th Annual International Cryptology Conference, Aug 2020, Santa Barbara, CA / Virtual, United States. pp.339-368, ⟨10.1007/978-3-030-56784-2_12⟩, Advances in Cryptology – CRYPTO 2020 ISBN: 9783030567835, CRYPTO (1)
Publication Year :
2020
Publisher :
HAL CCSD, 2020.

Abstract

International audience; The masking countermeasure is among the most powerful countermeasures to counteract side-channel attacks. Leakage models have been exhibited to theoretically reason on the security of such masked implementations. So far, the most widely used leakage model is the probing model defined by Ishai, Sahai, and Wagner at (CRYPTO 2003). While it is advantageously convenient for security proofs, it does not capture an adversary exploiting full leakage traces as, e.g., in horizontal attacks. Those attacks target the multiple manipulations of the same share to reduce noise and recover the corresponding value. To capture a wider class of attacks another model was introduced and is referred to as the random probing model. From a leakage parameter p, each wire of the circuit leaks its value with probability p. While this model much better reflects the physical reality of side channels, it requires more complex security proofs and does not yet come with practical constructions. In this paper, we define the first framework dedicated to the random probing model. We provide an automatic tool, called VRAPS, to quantify the random probing security of a circuit from its leakage probability. We also formalize a composition property for secure random probing gadgets and exhibit its relation to the strong non-interference (SNI) notion used in the context of probing security. We then revisit the expansion idea proposed by Ananth, Ishai, and Sahai (CRYPTO 2018) and introduce a compiler that builds a random probing secure circuit from small base gadgets achieving a random probing expandability property. We instantiate this compiler with small gadgets for which we verify the expected properties directly from our automatic tool. Our construction can tolerate a leakage probability up to 2 −8 , against 2 −25 for the previous construction, with a better asymptotic complexity.

Details

Language :
English
ISBN :
978-3-030-56783-5
ISBNs :
9783030567835
Database :
OpenAIRE
Journal :
Advances in Cryptology-CRYPTO}2020-40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part I, Advances in Cryptology – CRYPTO 202040th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part I, CRYPTO 2020-40th Annual International Cryptology Conference, CRYPTO 2020-40th Annual International Cryptology Conference, Aug 2020, Santa Barbara, CA / Virtual, United States. pp.339-368, ⟨10.1007/978-3-030-56784-2_12⟩, Advances in Cryptology – CRYPTO 2020 ISBN: 9783030567835, CRYPTO (1)
Accession number :
edsair.doi.dedup.....0bbf1e30b08f9004d2f26783cb5174c7