Paper 2020/185
Hardware Private Circuits: From Trivial Composition to Full Verification
Gaëtan Cassiers, Benjamin Grégoire, Itamar Levi, and François-Xavier Standaert
Abstract
The design of glitch-resistant higher-order masking schemes is an important challenge in cryptographic engineering. A recent work by Moos et al. (CHES 2019) showed that most published schemes (and all efficient ones) exhibit local or composability flaws at high security orders, leaving a critical gap in the literature on hardware masking. In this paper, we first extend the simulatability framework of Belaïd et al. (EUROCRYPT 2016) and prove that a compositional strategy that is correct without glitches remains valid with glitches. We then use this extended framework to prove the first masked gadgets that enable trivial composition with glitches at arbitrary orders. We show that the resulting "Hardware Private Circuits'' approach the implementation efficiency of previous (flawed) schemes. We finally investigate how trivial composition can serve as a basis for a tool that allows verifying full masked hardware implementations (e.g., of complete block ciphers) at any security order. The tool checks that a synthesized HDL code fulfills the topological requirements of the composability theorems. As side products, we improve the randomness complexity of the best published refreshing gadgets, show that some S-box representations allow latency reductions and confirm practical claims based on implementation~results.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. Minor revision. IEEE Transactions on Computers
- DOI
- 10.1109/TC.2020.3022979
- Keywords
- side-channel masking
- Contact author(s)
- gaetan cassiers @ uclouvain be
- History
- 2021-03-17: last of 3 revisions
- 2020-02-18: received
- See all versions
- Short URL
- https://ia.cr/2020/185
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2020/185, author = {Gaëtan Cassiers and Benjamin Grégoire and Itamar Levi and François-Xavier Standaert}, title = {Hardware Private Circuits: From Trivial Composition to Full Verification}, howpublished = {Cryptology {ePrint} Archive, Paper 2020/185}, year = {2020}, doi = {10.1109/TC.2020.3022979}, url = {https://eprint.iacr.org/2020/185} }