Paper 2020/786
Random Probing Security: Verification, Composition, Expansion and New Constructions
Sonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, and Abdul Rahman Taleb
Abstract
The masking countermeasure is among the most powerful countermeasures to counteract side-channel attacks. Leakage models have been exhibited to theoretically reason on the security of such masked implementations. So far, the most widely used leakage model is the probing model defined by Ishai, Sahai, and Wagner at (CRYPTO 2003). While it is advantageously convenient for security proofs, it does not capture an adversary exploiting full leakage traces as, e.g., in horizontal attacks. Those attacks target the multiple manipulations of the same share to reduce noise and recover the corresponding value. To capture a wider class of attacks another model was introduced and is referred to as the random probing model. From a leakage parameter p, each wire of the circuit leaks its value with probability
Metadata
- Available format(s)
-
PDF
- Category
- Foundations
- Publication info
- A major revision of an IACR publication in CRYPTO 2020
- Keywords
- CompilerMaskingAutomated verificationRandom probing model
- Contact author(s)
-
sonia belaid @ cryptoexperts com
jean-sebastien coron @ uni lu
emmanuel prouff @ ssi gouv fr
matthieu rivain @ cryptoexperts com
abdul taleb @ cryptoexperts com - History
- 2020-10-29: last of 3 revisions
- 2020-06-27: received
- See all versions
- Short URL
- https://ia.cr/2020/786
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2020/786, author = {Sonia Belaïd and Jean-Sébastien Coron and Emmanuel Prouff and Matthieu Rivain and Abdul Rahman Taleb}, title = {Random Probing Security: Verification, Composition, Expansion and New Constructions}, howpublished = {Cryptology {ePrint} Archive, Paper 2020/786}, year = {2020}, url = {https://eprint.iacr.org/2020/786} }