Back to Search Start Over

Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations

Authors :
Sonia Belaïd
Raphaël Wintersdorff
Pierre-Évariste Dagand
Darius Mercadier
Matthieu Rivain
CryptoExperts
Well Honed Infrastructure Software for Programming Environments and Runtimes ( Whisper)
Inria de Paris
Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-LIP6
Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)
This work is partly supported by the French FUI-AAP25 VeriSiCC project, the Émergence(s) program of the City of Paris and the EDITE doctoral school.
Well Honed Infrastructure Software for Programming Environments and Runtimes (Whisper)
Source :
EUROCRYPT, Eurocrypt 2020-39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2020-39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2020, Zagreb / Virtual, Croatia. pp.311-341, ⟨10.1007/978-3-030-45727-3_11⟩, Advances in Cryptology – EUROCRYPT 2020 ISBN: 9783030457266, EUROCRYPT (3)
Publication Year :
2020
Publisher :
HAL CCSD, 2020.

Abstract

International audience; Cryptographic implementations deployed in real world devices often aim at (provable) security against the powerful class of side-channel attacks while keeping reasonable performances. Last year at Asiacrypt, a new formal verification tool named tightPROVE was put forward to exactly determine whether a masked implementation is secure in the well-deployed probing security model for any given security order t. Also recently, a compiler named Usuba was proposed to automatically generate bitsliced implementations of cryptographic primitives.This paper goes one step further in the security and performances achievements with a new automatic tool named Tornado. In a nutshell, from the high-level description of a cryptographic primitive, Tornado produces a functionally equivalent bitsliced masked implementation at any desired order proven secure in the probing model, but additionally in the so-called register probing model which much better fits the reality of software implementations. This framework is obtained by the integration of Usuba with tightPROVE+, which extends tightPROVE with the ability to verify the security of implementations in the register probing model and to fix them with inserting refresh gadgets at carefully chosen locations accordingly.We demonstrate Tornado on the lightweight cryptographic primitives selected to the second round of the NIST competition and which somehow claimed to be masking friendly. It advantageously displays performances of the resulting masked implementations for several masking orders and prove their security in the register probing model.

Details

Language :
English
ISBN :
978-3-030-45726-6
ISBNs :
9783030457266
Database :
OpenAIRE
Journal :
EUROCRYPT, Eurocrypt 2020-39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2020-39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2020, Zagreb / Virtual, Croatia. pp.311-341, ⟨10.1007/978-3-030-45727-3_11⟩, Advances in Cryptology – EUROCRYPT 2020 ISBN: 9783030457266, EUROCRYPT (3)
Accession number :
edsair.doi.dedup.....ae29a94fba1aea67cebee12f69599b02