Cryptology ePrint Archive: Report 2016/282

Detecting flawed masking schemes with leakage detection tests

Oscar Reparaz

Abstract: Masking is a popular countermeasure to thwart side-channel attacks on embedded systems. Many proposed masking schemes, even carrying ``security proofs'', are eventually broken because they are flawed by design. The security validation process is nowadays a lengthy, tedious and manual process.

In this paper, we report on a method to verify the soundness of a masking scheme before implementing it on a device. We show that by instrumenting a high-level implementation of the masking scheme and by applying leakage detection techniques, a system designer can quickly assess at design time whether the masking scheme is flawed or not, and to what extent. Our method requires not more than working high-level source code and is based on simulation. Thus, our method can be used already in the very early stages of design. We validate our approach by spotting in an automated fashion first-, second- and third-order flaws in recently published state-of-the-art schemes in a matter of seconds with limited computational resources. We also present a new second-order flaw on a table recomputation scheme, and show that the approach is useful when designing a hardware masked implementation.

Category / Keywords: implementation / side-channel analysis, DPA, masking

Original Publication (with minor differences): IACR-FSE-2016

Date: received 14 Mar 2016

Contact author: oscar reparaz at esat kuleuven be

Available format(s): PDF | BibTeX Citation

Version: 20160315:091127 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]