eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.

Paper 2016/912

Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model

Gilles Barthe, François Dupressoir, Sebastian Faust, Benjamin Grégoire, François-Xavier Standaert, and Pierre-Yves Strub

Abstract

In this paper, we provide a necessary clarification of the good security properties that can be obtained from parallel implementations of masking schemes. For this purpose, we first argue that (i) the probing model is not straightforward to interpret, since it more naturally captures the intuitions of serial implementations, and (ii) the noisy leakage model is not always convenient, e.g. when combined with formal methods for the verification of cryptographic implementations. Therefore we introduce a new model, the bounded moment model, that formalizes a weaker notion of security order frequently used in the side-channel literature. Interestingly, we prove that probing security for a serial implementation implies bounded moment security for its parallel counterpart. This result therefore enables an accurate understanding of the links between formal security analyses of masking schemes and experimental security evaluations based on the estimation of statistical moments. Besides its consolidating nature, our work also brings useful technical contributions. First, we describe and analyze refreshing and multiplication algorithms that are well suited for parallel implementations and improve security against multivariate side-channel attacks. Second, we show that simple refreshing algorithms (with linear complexity) that are not secure in the continuous probing model are secure in the continuous bounded moment model. Eventually, we discuss the independent leakage assumption required for masking to deliver its security promises, and its specificities related to the serial or parallel nature of an implementation.

Metadata
Available format(s)
PDF
Publication info
A minor revision of an IACR publication in EUROCRYPT 2017
Keywords
side-channel attacksmaskingformal methodsparallel implementations
Contact author(s)
gjbarthe @ gmail com
fdupress @ gmail com
sebastian faust @ gmail com
Benjamin Gregoire @ inria fr
fstandae @ uclouvain be
pierre-yves @ strub nu
History
2017-02-13: revised
2016-09-19: received
See all versions
Short URL
https://ia.cr/2016/912
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/912,
      author = {Gilles Barthe and François Dupressoir and Sebastian Faust and Benjamin Grégoire and François-Xavier Standaert and Pierre-Yves Strub},
      title = {Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model},
      howpublished = {Cryptology ePrint Archive, Paper 2016/912},
      year = {2016},
      note = {\url{https://eprint.iacr.org/2016/912}},
      url = {https://eprint.iacr.org/2016/912}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.