Skip to main content
Erschienen in: Journal of Cryptographic Engineering 3/2019

16.03.2019 | Regular Paper

Side-channel robustness analysis of masked assembly codes using a symbolic approach

verfasst von: Inès Ben El Ouahma, Quentin L. Meunier, Karine Heydemann, Emmanuelle Encrenaz

Erschienen in: Journal of Cryptographic Engineering | Ausgabe 3/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Masking is a popular countermeasure against side-channel attacks, which randomizes secret data with random and uniform variables called masks. At software level, masking is usually added in the source code and its effectiveness needs to be verified. In this paper, we propose a symbolic method to verify side-channel robustness of masked programs. The analysis is performed at the assembly level since compilation and optimizations may alter the added protections. Our proposed method aims to verify that intermediate computations are statistically independent from secret variables using defined distribution inference rules. We verify the first round of a masked AES in 22 s and show that some secure algorithms or source codes are not leakage-free in their assembly implementations.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Balasch, J., Gierlichs, B., Grosso, V., Reparaz, O., Standaert, F.-X.: On the cost of lazy engineering for masked software implementations. In: International Conference on Smart Card Research and Advanced Applications, pp. 64–81. Springer (2014) Balasch, J., Gierlichs, B., Grosso, V., Reparaz, O., Standaert, F.-X.: On the cost of lazy engineering for masked software implementations. In: International Conference on Smart Card Research and Advanced Applications, pp. 64–81. Springer (2014)
2.
Zurück zum Zitat Barthe, G., Belaïd, S., Dupressoir, F., Fouque, P.-A., Grégoire, B., Strub, P.-Y.: Verified proofs of higher-order masking. In: Eurocrypt 2015, number 9056 (2015) Barthe, G., Belaïd, S., Dupressoir, F., Fouque, P.-A., Grégoire, B., Strub, P.-Y.: Verified proofs of higher-order masking. In: Eurocrypt 2015, number 9056 (2015)
3.
Zurück zum Zitat Barthe, G., Dupressoir, F., Faust, S., Grégoire, B., Standaert, F.-X., Strub, P.-Y.: Parallel implementations of masking schemes and the bounded moment leakage model. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 535–566. Springer (2017) Barthe, G., Dupressoir, F., Faust, S., Grégoire, B., Standaert, F.-X., Strub, P.-Y.: Parallel implementations of masking schemes and the bounded moment leakage model. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 535–566. Springer (2017)
4.
Zurück zum Zitat Bayrak, A.G., Regazzoni, F., Novo, D., Brisk, P., Standaert, F.-X., Ienne, P.: Automatic application of power analysis countermeasures. IEEE Trans. Comput. 64(2), 329–341 (2015)MathSciNetCrossRef Bayrak, A.G., Regazzoni, F., Novo, D., Brisk, P., Standaert, F.-X., Ienne, P.: Automatic application of power analysis countermeasures. IEEE Trans. Comput. 64(2), 329–341 (2015)MathSciNetCrossRef
5.
Zurück zum Zitat Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK families of lightweight block ciphers. IACR Cryptol. 2013, 404 (2013)MATH Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK families of lightweight block ciphers. IACR Cryptol. 2013, 404 (2013)MATH
6.
Zurück zum Zitat Bilgin, B., Gierlichs, B., Nikova, S., Nikov, V., Rijmen, V.: Higher-order threshold implementations. In: Lecture Notes in Computer Science, vol. 8874, pp. 326–343. Springer (2014) Bilgin, B., Gierlichs, B., Nikova, S., Nikov, V., Rijmen, V.: Higher-order threshold implementations. In: Lecture Notes in Computer Science, vol. 8874, pp. 326–343. Springer (2014)
7.
Zurück zum Zitat Blömer, J., Guajardo, J., Krummel, V.: Provably secure masking of aes. In: International Workshop on Selected Areas in Cryptography, pp. 69–83. Springer (2004) Blömer, J., Guajardo, J., Krummel, V.: Provably secure masking of aes. In: International Workshop on Selected Areas in Cryptography, pp. 69–83. Springer (2004)
8.
Zurück zum Zitat Chen, C., Inci, M.S., Taha, M., Eisenbarth, T.: Spectre: a tiny side-channel resistant speck core for fpgas. IACR Cryptol. 2015, 691 (2015) Chen, C., Inci, M.S., Taha, M., Eisenbarth, T.: Spectre: a tiny side-channel resistant speck core for fpgas. IACR Cryptol. 2015, 691 (2015)
9.
Zurück zum Zitat Coron, J.-S.: Higher order masking of look-up tables. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 441–458. Springer (2014) Coron, J.-S.: Higher order masking of look-up tables. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 441–458. Springer (2014)
10.
Zurück zum Zitat Coron, J.-S., Großschädl, J., Tibouchi, M., Vadnala, P. K.: Conversion from arithmetic to boolean masking with logarithmic complexity. In: International Workshop on Fast Software Encryption, pp. 130–149. Springer (2015) Coron, J.-S., Großschädl, J., Tibouchi, M., Vadnala, P. K.: Conversion from arithmetic to boolean masking with logarithmic complexity. In: International Workshop on Fast Software Encryption, pp. 130–149. Springer (2015)
11.
Zurück zum Zitat Coron, J.-S., Prouff, E., Rivain, M.: Side channel cryptanalysis of a higher order masking scheme. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 28–44. Springer (2007) Coron, J.-S., Prouff, E., Rivain, M.: Side channel cryptanalysis of a higher order masking scheme. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 28–44. Springer (2007)
12.
Zurück zum Zitat Eldib, H., Wang, C.: Synthesis of masking countermeasures against side channel attacks. CAV 8559, 114–130 (2014) Eldib, H., Wang, C.: Synthesis of masking countermeasures against side channel attacks. CAV 8559, 114–130 (2014)
13.
Zurück zum Zitat Eldib, H., Wang, C., Schaumont, P.: Formal verification of software countermeasures against side-channel attacks. ACM Trans. Softw. Eng. Methodol. 24(2), 11 (2014)CrossRef Eldib, H., Wang, C., Schaumont, P.: Formal verification of software countermeasures against side-channel attacks. ACM Trans. Softw. Eng. Methodol. 24(2), 11 (2014)CrossRef
14.
Zurück zum Zitat Eldib, H., Wang, C., Taha, M., Schaumont, P.: Quantitative masking strength: quantifying the power side-channel resistance of software code. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(10), 1558–1568 (2015)CrossRef Eldib, H., Wang, C., Taha, M., Schaumont, P.: Quantitative masking strength: quantifying the power side-channel resistance of software code. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(10), 1558–1568 (2015)CrossRef
15.
Zurück zum Zitat Goodwill, G., Jun, B., Jaffe, J., Rohatgi, P.: A testing methodology for side-channel resistance validation. In: NIST Non-invasive Attack Testing Workshop (2011) Goodwill, G., Jun, B., Jaffe, J., Rohatgi, P.: A testing methodology for side-channel resistance validation. In: NIST Non-invasive Attack Testing Workshop (2011)
16.
Zurück zum Zitat Goubin, L.: A sound method for switching between boolean and arithmetic masking. In: Cryptographic Hardware and Embedded SystemsCHES 2001, pp. 3–15. Springer (2001) Goubin, L.: A sound method for switching between boolean and arithmetic masking. In: Cryptographic Hardware and Embedded SystemsCHES 2001, pp. 3–15. Springer (2001)
17.
Zurück zum Zitat Herbst, C., Oswald, E., Mangard, S.: An aes smart card implementation resistant to power analysis attacks. In: ACNS, vol. 3989, pp. 239–252. Springer (2006) Herbst, C., Oswald, E., Mangard, S.: An aes smart card implementation resistant to power analysis attacks. In: ACNS, vol. 3989, pp. 239–252. Springer (2006)
18.
Zurück zum Zitat Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, rsa, dss, and other systems. In: Annual International Cryptology Conference, pp. 104–113. Springer (1996) Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, rsa, dss, and other systems. In: Annual International Cryptology Conference, pp. 104–113. Springer (1996)
19.
Zurück zum Zitat Microsoft Research. Z3py-python interface for the z3 theorem prover (2012) Microsoft Research. Z3py-python interface for the z3 theorem prover (2012)
20.
Zurück zum Zitat Papagiannopoulos, K., Veshchikov, N.: Mind the gap: towards secure 1st-order masking in software. IACR Cryptol. 2017, 345 (2017) Papagiannopoulos, K., Veshchikov, N.: Mind the gap: towards secure 1st-order masking in software. IACR Cryptol. 2017, 345 (2017)
21.
Zurück zum Zitat Prouff, E., Rivain, M.: Masking against side-channel attacks: a formal security proof. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 142–159. Springer (2013) Prouff, E., Rivain, M.: Masking against side-channel attacks: a formal security proof. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 142–159. Springer (2013)
22.
Zurück zum Zitat Reparaz, O.: Detecting flawed masking schemes with leakage detection tests. In: Lecture Notes in Computer Science. Springer (2016) Reparaz, O.: Detecting flawed masking schemes with leakage detection tests. In: Lecture Notes in Computer Science. Springer (2016)
23.
Zurück zum Zitat Reparaz, O., Gierlichs, B., Verbauwhede, I.: Fast leakage assessment. In: International Conference on Cryptographic Hardware and Embedded Systems. Springer (2017) Reparaz, O., Gierlichs, B., Verbauwhede, I.: Fast leakage assessment. In: International Conference on Cryptographic Hardware and Embedded Systems. Springer (2017)
24.
Zurück zum Zitat Ronen, E., OFlynn, C., Shamir, A., Weingarten, A.-O.: IoT Goes Nuclear: Creating a ZigBee Chain Reaction. Technical Report 1047 (2016) Ronen, E., OFlynn, C., Shamir, A., Weingarten, A.-O.: IoT Goes Nuclear: Creating a ZigBee Chain Reaction. Technical Report 1047 (2016)
25.
Zurück zum Zitat Shahverdi, A., Taha, M., Eisenbarth, T.: Lightweight side channel resistance: threshold implementations of simon. IEEE Trans. Comput. 66(4), 661–671 (2017)MathSciNetCrossRefMATH Shahverdi, A., Taha, M., Eisenbarth, T.: Lightweight side channel resistance: threshold implementations of simon. IEEE Trans. Comput. 66(4), 661–671 (2017)MathSciNetCrossRefMATH
26.
Zurück zum Zitat Standaert, F.-X.: How (not) to use Welch’s t-test in side-channel security evaluations. IACR Cryptol. 2017, 138 (2017) Standaert, F.-X.: How (not) to use Welch’s t-test in side-channel security evaluations. IACR Cryptol. 2017, 138 (2017)
27.
Zurück zum Zitat Strobel, D., Oswald, D., Richter, B., Schellenberg, F., Paar, C.: Microcontrollers as (in)security devices for pervasive computing applications. Proc. IEEE 102(8), 1157–1173 (2014)CrossRef Strobel, D., Oswald, D., Richter, B., Schellenberg, F., Paar, C.: Microcontrollers as (in)security devices for pervasive computing applications. Proc. IEEE 102(8), 1157–1173 (2014)CrossRef
28.
Zurück zum Zitat Veshchikov, N.: Silk: high level of abstraction leakage simulator for side channel analysis. In: Proceedings of the 4th Program Protection and Reverse Engineering Workshop. ACM (2014) Veshchikov, N.: Silk: high level of abstraction leakage simulator for side channel analysis. In: Proceedings of the 4th Program Protection and Reverse Engineering Workshop. ACM (2014)
Metadaten
Titel
Side-channel robustness analysis of masked assembly codes using a symbolic approach
verfasst von
Inès Ben El Ouahma
Quentin L. Meunier
Karine Heydemann
Emmanuelle Encrenaz
Publikationsdatum
16.03.2019
Verlag
Springer Berlin Heidelberg
Erschienen in
Journal of Cryptographic Engineering / Ausgabe 3/2019
Print ISSN: 2190-8508
Elektronische ISSN: 2190-8516
DOI
https://doi.org/10.1007/s13389-019-00205-7

Weitere Artikel der Ausgabe 3/2019

Journal of Cryptographic Engineering 3/2019 Zur Ausgabe