DocumentCode :
2312023
Title :
Formal security evaluation of hardware Boolean masking against second-order attacks
Author :
Maghrebi, Houssem ; Guilley, Sylvain ; Danger, Jean-Luc
Author_Institution :
Dept. COMELEC, Telecom ParisTech, Paris, France
fYear :
2011
fDate :
5-6 June 2011
Firstpage :
40
Lastpage :
46
Abstract :
The masking countermeasure in hardware has been widely studied, for its simplicity and its efficiency. Notably, no care is required at backend level and the throughput is not affected with respect to an unprotected implementation. In this article, we are concerned with a formal security evaluation of Boolean hardware masking schemes. Following a practice-oriented evaluation framework introduced at EURO-CRYPT´2009, we compute both leakage and attack metrics. The hardware implementations have the specificity that the signal to noise ratio is below 1. In this particular case, we prove that a leakage metric (namely the mutual information) allows to characterize perfectly the best attack. This was previously unknown; moreover, we exhibit explicitly the links between leakage and attacks metrics. This result is in line with but conflicts with. More precisely, second-order DPA with a centered product combination function yields the largest leaks and the most powerful attacks. However, those are not possible if the implementation is “zero-offset”, an implementation of first-order masking only possible in hardware. Furthermore, even the sub-optimal attacks are impeded, due to the high noise that characterizes parallel hardware crypto-processors. Therefore, masked implementations in hardware reach much higher security levels than software counterparts while not degrading significantly the computation throughput.
Keywords :
Boolean functions; hearing; security of data; formal security evaluation; hardware boolean masking; leakage metric; parallel hardware crypto processors; signal to noise ratio; Hardware; Measurement; Mutual information; Security; Signal to noise ratio; Software; Algorithmic noise; FPGA; Hardware masking countermeasure; Mutual Information Analysis (MIA); Mutual Information Metric (MIM); Second-order side-channel attacks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Hardware-Oriented Security and Trust (HOST), 2011 IEEE International Symposium on
Conference_Location :
San Diego CA
Print_ISBN :
978-1-4577-1059-9
Type :
conf
DOI :
10.1109/HST.2011.5954993
Filename :
5954993
Link To Document :
بازگشت