Paper 2022/901

Garbled-Circuits from an SCA Perspective: Free XOR can be Quite Expensive. . .

Itamar Levi, Bar-Ilan University
Carmit Hazay, Bar-Ilan University
Abstract

Garbling schemes, invented in the 80's by Yao (FOCS'86), have been a versatile and fundamental tool in modern cryptography. A prominent application of garbled circuits is constant round secure two-party computation, led to a long line of study of this object, where one of the most influential optimizations is Free-XOR (Kolesnikov and Schneider ICALP'08), introducing a global offset $\Delta$ for all garbled wire values where XOR gates are computed locally without garbling them. To date, garbling sachems were not studied per their side-channel attacks (SCA) security characteristics, even though SCA pose a significant security threat to cryptographic devices. In this research we demonstrate that adversaries utilizing advanced SCA tools such as horizontal attacks, mixed with advanced hypothesis building and standard (vertical) SCA tools, can jeopardize garbling implementations. Our main observation is that garbling schemes utilizing a global secret $\Delta$ open a door to quite trivial side-channel attacks. We model our side-channel attacks on the garbler's device and discuss the asymmetric setting where various computations are not performed on the evaluator side. This enables dangerous leakage extraction on the garbler and renders our attack impossible on the evaluator's side. Theoretically, we first demonstrate on a simulated environment, that such attacks are quite devastating. Concretely, our attack is capable of extracting $\Delta$ when the circuit embeds only $8$ input non-linear gates with fifth/first-order attack Success-Rates of $0.65$/$0.7$. With as little as $3$ such gates, our attack reduces the first-order Guessing Entropy of $\Delta$ from $128$ to $\sim48$-bits. We further demonstrate our attack via an implementation and measurements data over an STM 32-bit processor software implementing circuit garbling, and discuss their limitations and mitigation tactics on logical, protocol and implementation layers.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Secure Computation Garbled Circuits Free-XOR Side-channel analysis Horizontal Attacks Single Trace
Contact author(s)
itamar levi @ biu ac il
Carmit Hazay @ biu ac il
History
2022-10-30: revised
2022-07-11: received
See all versions
Short URL
https://ia.cr/2022/901
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/901,
      author = {Itamar Levi and Carmit Hazay},
      title = {Garbled-Circuits from an SCA Perspective: Free XOR can be Quite Expensive. . .},
      howpublished = {Cryptology ePrint Archive, Paper 2022/901},
      year = {2022},
      note = {\url{https://eprint.iacr.org/2022/901}},
      url = {https://eprint.iacr.org/2022/901}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.