Paper 2013/396
On the Practical Security of a Leakage Resilient Masking Scheme
Emmanuel Prouff, Matthieu Rivain, and Thomas Roche
Abstract
At TCC 2012, Dziembowski and Faust show how to construct leakage resilient circuits using secret sharing based on the inner product [2]. At Asiacrypt 2012, Ballash et al. turned the latter construction into an efficient masking scheme and they apply it to protect an implementation of AES against side-channel attacks [1]. The so-called Inner-Product masking (IPmasking for short) was claimed to be secure with respect to two different security models: the $\lambda$-limited security model (Section 4 of [1]), and the dth-order security model (see definitions p.8 of [1]). In the former model, the security proof makes sense for a sharing dimension $n > 130$ which is acknowledged impractical by the authors. In the latter model, the scheme is claimed secure up to the order $d = n-1$. In this note, we contradict the dth-order security claim by exhibiting a 1st-order flaw in the masking algorithm for any chosen sharing dimension n.
Metadata
- Available format(s)
- Publication info
- Published elsewhere. Unknown where it was published
- Contact author(s)
- thomas roche @ ssi gouv fr
- History
- 2013-06-18: received
- Short URL
- https://ia.cr/2013/396
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2013/396, author = {Emmanuel Prouff and Matthieu Rivain and Thomas Roche}, title = {On the Practical Security of a Leakage Resilient Masking Scheme}, howpublished = {Cryptology {ePrint} Archive, Paper 2013/396}, year = {2013}, url = {https://eprint.iacr.org/2013/396} }