Cryptology ePrint Archive: Report 2019/1106

Side-channel Masking with Pseudo-Random Generator

Jean-Sébastien Coron and Aurélien Greuet and Rina Zeitoun

Abstract: High-order masking countermeasures against side-channel attacks usually require plenty of randomness during their execution. For security against t probes, the classical ISW countermeasure requires O(t^2 s) random bits, where s is the circuit size. However running a True Random Number Generator (TRNG) can be costly in practice and become a bottleneck on embedded devices. In [IKL+13] the authors introduced the notion of robust pseudo-random number generator (PRG), which must remain secure even against an adversary who can probe at most t wires. They showed that when embedding a robust PRG within a private circuit, the number of random bits can be reduced to O(t^4), that is independent of the circuit size s (up to a logarithmic factor). Using bipartite expander graphs, this can be further reduced to O(t^(3+eps)); however the resulting construction is unpractical.

In this paper we describe a practical construction where the number of random bits is only O(t^2) for security against t probes, without expander graphs; moreover the running time of each pseudo-random generation goes down from O(t^4) to O(t). Our technique consists in using multiple independent PRGs instead of a single one. We show that for ISW circuits, the robustness property of the PRG is not required anymore, which leads to simple and efficient constructions. For example, for AES we only need 48 bytes of randomness to get second-order security (t=2), instead of 2880 in the original Rivain-Prouff countermeasure; when implemented on an ARM-based embedded device with a relatively slow TRNG, we obtain a 50% speed-up compared to Rivain-Prouff.

Category / Keywords: foundations / Side-channel countermeasure, high-order masking, ISW probing model.

Date: received 27 Sep 2019

Contact author: jscoron at gmail com,aurelien greuet@idemia com,rina zeitoun@idemia com

Available format(s): PDF | BibTeX Citation

Version: 20190929:184305 (All versions of this report)

Short URL: ia.cr/2019/1106


[ Cryptology ePrint archive ]