Abstract

Couplings are a type of physical default that can violate the independence assumption needed for the secure implementation of the masking countermeasure. Two recent works by De Cnudde et al. put forward qualitatively that couplings can cause information leakages of lower order than theoretically expected. However, the (quantitative) amplitude of these lower-order leakages (e.g., measured as the amplitude of a detection metric such as Welch’s T statistic) was usually lower than the one of the (theoretically expected) dth order leakages. So the actual security level of these implementations remained unaffected. In addition, in order to make the couplings visible, the authors sometimes needed to amplify them internally (e.g., by tweaking the placement and routing or iterating linear operations on the shares). In this paper, we first show that the amplitude of low-order leakages in masked implementations can be amplified externally, by tweaking side-channel measurement setups in a way that is under control of a power analysis adversary. Our experiments put forward that the “effective security order” of both hardware (FPGA) and software (ARM-32) implementations can be reduced, leading to concrete reductions of their security level. For this purpose, we move from the detection-based analyzes of previous works to attack-based evaluations, allowing to confirm the exploitability of the lower-order leakages that we amplify. We also provide a tentative explanation for these effects based on couplings, and describe a model that can be used to predict them in function of the measurement setup’s external resistor and implementation’s supply voltage. We posit that the effective security orders observed are mainly due to “externally-amplified couplings” that can be systematically exploited by actual adversaries.

Highlights

  • Masking is a theoretically well understood countermeasure against Side-Channel Attacks

  • We present our contributions starting with our model and an intuitive description of the externally-amplified couplings which we assume are the cause of our results. This provides us with a basis to discuss the experiments of Section 3, where we evaluate externally-amplified reductions of the effective security order for a Domain-Oriented-Masking architecture implemented on an FPGA, and the ones of Section 4, where we evaluate them for the bit-wise parallel masking scheme of Barthe et al (ARM 32-bit software implementation)

  • We believe our results are important for both cryptographic hardware designers and evaluation laboratories, since they extend previous findings about setup manipulations and couplings in a way that can be systematically exploited by adversaries

Read more

Summary

Introduction

Masking is a theoretically well understood countermeasure against Side-Channel Attacks. We extend these results by exhibiting reductions of the effective security order, defined as the order of the statistical moment that can be exploited with the smallest number of measurements (which, as per footnote 1, depends on the noise level) For this purpose, we provide experimental results of both a hardware (FPGA) case study based on Domain-Oriented Masking (DOM) [GMK17], and a software (ARM-32) case study based on Barthe et al.’s parallel masking scheme [BDF+17]. This provides us with a basis to discuss the experiments of Section 3, where we evaluate externally-amplified reductions of the effective security order for a Domain-Oriented-Masking architecture implemented on an FPGA, and the ones of Section 4, where we evaluate them for the bit-wise parallel masking scheme of Barthe et al (ARM 32-bit software implementation).

Background
Measurement Setups
Moments-Correlating Profiled DPA and Welch’s T-test
Externally-Amplified Couplings
Intuitive Description
A Simple Model
Leakage Distributions
MCP-DPA
Leakage Detection
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.