Paper 2022/965

PROLEAD - A Probing-Based Hardware Leakage Detection Tool

Nicolai Müller, Ruhr University Bochum
Amir Moradi, University of Cologne
Abstract

Even today, SCA attacks pose a serious threat to the security of cryptographic implementations fabricated with low-power and nano-scale feature technologies. Fortunately, the masking countermeasures offer reliable protection against such attacks based on simple security assumptions. However, the practical application of masking to a cryptographic algorithm is not trivial, and the designer may overlook possible security flaws, especially when masking a complex circuit. Moreover, abstract models like probing security allow formal verification tools to evaluate masked implementations. However, this is computationally too expensive when dealing with circuits that are not based on composable gadgets. Unfortunately, using composable gadgets comes at some area overhead. As a result, such tools can only evaluate subcircuits, not their compositions, which can become the Achilles' heel of such masked implementations. In this work, we apply logic simulations to evaluate the security of masked implementations which are not necessarily based on composable gadgets. We developed PROLEAD, an automated tool analyzing the statistical independence of simulated intermediates probed by a robust probing adversary. Compared to the state of the art, our approach (1) does not require any power model as only the state of a gate-level netlist is simulated, (2) can handle masked full cipher implementations, and (3) can detect flaws related to the combined occurrence of glitches and transitions as well as higher-order multivariate leakages. With PROLEAD, we can evaluate masked implementations that are too complex for existing formal verification tools while being in line with the robust probing model. Through PROLEAD, we have detected security flaws in several publicly-available masked implementations, which have been claimed to be robust probing secure.

Note: PROLEAD is available via GitHub: https://github.com/ChairImpSec/PROLEAD

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Published by the IACR in TCHES 2022
Keywords
Side-Channel Analysis Leakage Detection Probing Security Hardware
Contact author(s)
nicolai mueller @ rub de
amir moradi @ rub de
History
2022-07-28: approved
2022-07-27: received
See all versions
Short URL
https://ia.cr/2022/965
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/965,
      author = {Nicolai Müller and Amir Moradi},
      title = {PROLEAD - A Probing-Based Hardware Leakage Detection Tool},
      howpublished = {Cryptology ePrint Archive, Paper 2022/965},
      year = {2022},
      note = {\url{https://eprint.iacr.org/2022/965}},
      url = {https://eprint.iacr.org/2022/965}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.