Cryptology ePrint Archive: Report 2022/507

Low-Latency Hardware Private Circuits

David Knichel and Amir Moradi

Abstract: Over the last years, the rise of the IoT, and the connection of mobile - and hence physically accessible - devices, immensely enhanced the demand for fast and secure hardware implementations of cryptographic algorithms which offer thorough protection against SCA attacks. Among a variety of proposed countermeasures against SCA, masking has transpired to be a promising candidate, attracting significant attention in both, academia and industry. Here, abstract adversary models have been derived, aiming to accurately model real-world attack scenarios, while being sufficiently simple to enable formally proving the SCA resilience of masked implementations on an algorithmic level. In the context of hardware implementations, the robust probing model has become highly relevant for proving SCA resilience due to its capability to model physical defaults like glitches and data transitions. As constructing a correct and secure masked variant of large and complex circuits is a challenging task, a new line of research has recently emerged, aiming to design small, masked subcircuits - realizing for instance a simple AND gate - which still guarantee security when composed to a larger circuit. Although several designs realizing such composable subcircuits - commonly referred to as gadgets - have been proposed, negligible research was conducted in order to find trade-offs between different overhead metrics, like randomness requirement, latency, and area consumption. In this work, we present HPC3, a hardware gadget which is trivially composable under the notion of PINI in the glitch-extended robust probing model. HPC3 realizes a two-input AND gate in one clock cycle which is generalized for any arbitrary security order. Existing state-of-the-art PINI gadgets either require a latency of two clock cycles or are limited to first-order security. In short, HPC3 enables the designer to trade double the randomness for half the latency compared to existing gadgets, providing high flexibility and enabling the designer to gain significantly more speed in real-time applications.

Category / Keywords: implementation / SCA-resilient Implementations, Trivially Composable Gadgets, Hardware Private Circuits, Probing Model

Original Publication (in the same form): ACM Conference on Computer and Communications Security (CCS 2022)

Date: received 28 Apr 2022, last revised 13 May 2022

Contact author: david knichel at rub de, amir moradi at rub de

Available format(s): PDF | BibTeX Citation

Version: 20220513:091458 (All versions of this report)

Short URL: ia.cr/2022/507


[ Cryptology ePrint archive ]