Paper 2019/1005

Threshold Implementations in the Robust Probing Model

Siemen Dhooghe, Svetla Nikova, and Vincent Rijmen

Abstract

Threshold Implementations (TI) are secure algorithmic countermeasures against side-channel attacks in the form of differential power analysis. The strength of TI lies in its minimal algorithmic requirements. These requirements have been studied over more than 10 years and many efficient implementations for symmetric primitives have been proposed. Thus, over the years the practice of protecting implementations matured, however, the theory behind threshold implementations remained the same. In this work, we revise this theory by looking at the properties of correctness, non-completeness, and uniformity as a composable security model. We prove that this model provides first-order and higher-order univariate security in the glitch-robust probing model which lets us expand the theoretic framework of TI. We first provide a link between uniformity and the notion of non-interference, a known composable security notion building out the probing model. We then relax the notion of non-completeness which helps the design of secure expansion and compression functions. Lastly, we provide generalisations of the threshold notions to allow for general secret sharing schemes and provide examples of how different sharing schemes affect the security and efficiency of the countermeasure.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Minor revision. Theory of Implementation Security Workshop
DOI
10.1145/3338467.3358949
Keywords
DPAMaskingSecurity ProofsThreshold Implementations
Contact author(s)
siemen dhooghe @ esat kuleuven be
History
2019-09-05: received
Short URL
https://ia.cr/2019/1005
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/1005,
      author = {Siemen Dhooghe and Svetla Nikova and Vincent Rijmen},
      title = {Threshold Implementations in the Robust Probing Model},
      howpublished = {Cryptology ePrint Archive, Paper 2019/1005},
      year = {2019},
      doi = {10.1145/3338467.3358949},
      note = {\url{https://eprint.iacr.org/2019/1005}},
      url = {https://eprint.iacr.org/2019/1005}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.