Cryptology ePrint Archive: Report 2017/1227

VerMI: Verification Tool for Masked Implementations

Victor Arribas and Svetla Nikova and Vincent Rijmen

Abstract: Masking is a widely used countermeasure against Side-Channel Attacks (SCA), but the implementation of these countermeasures is challenging. Experimental security evaluation requires special equipment, a considerable amount of time and extensive technical knowledge. So, to automate and to speed up this process, a formal verification can be performed to asses the security of a design. Multiple theoretical approaches and verification tools have been proposed in the literature. The majority of them are tailored for software implementations, not applicable to hardware since they do not take into account glitches. Existing hardware verification tools are limited either to combinational logic or to small designs due to the computational resources needed. In this work we present VerMI, a verification tool in the form of a logic simulator that checks the properties defined in Threshold Implementations to address the security of a hardware implementation for meaningful orders of security. The tool is designed so that any masking scheme can be evaluated. It accepts combinational and sequential logic and is able to analyze an entire cipher in short time. With the tool we have managed to spot a flaw in the round-based Keccak implementation by Gross et al., published in DSD 2017.

Category / Keywords: implementation / VerMI, Masking, Formal Verification, Non-completeness, Uniformity, Glitches, Logic Simulator

Date: received 20 Dec 2017

Contact author: varribas at esat kuleuven be, Svetla Nikova@esat kuleuven be, vincent rijmen@esat kuleuven be,

Available format(s): PDF | BibTeX Citation

Version: 20171222:201657 (All versions of this report)

Short URL: ia.cr/2017/1227


[ Cryptology ePrint archive ]