Paper 2023/001
Time is money, friend! Timing Side-channel Attack against Garbled Circuit Constructions
Abstract
With the advent of secure function evaluation (SFE), distrustful parties can jointly compute on their private inputs without disclosing anything besides the results. Yao’s garbled circuit protocol has become an integral part of secure computation thanks to considerable efforts made to make it feasible, practical, and more efficient. These efforts have resulted in multiple optimizations on this primitive to enhance its performance by orders of magnitude over the last years. The advancement in protocols has also led to the development of general-purpose compilers and tools made available to academia and industry. For decades, the security of protocols offered in those tools has been assured with regard to sound proofs and the promise that during the computation, no information on parties’ input would be leaking. In a parallel effort, however, side-channel analysis (SCA) has gained momentum in connection with the real-world implementation of cryptographic primitives. Timing side-channel attacks have proven themselves effective in retrieving secrets from implementations, even through remote access to them. Nevertheless, the vulnerability of garbled circuit frameworks to timing attacks has, surprisingly, never been discussed in the literature. This paper introduces Goblin, the first timing attack against commonly employed garbled circuit frameworks. Goblin is a machine learning-assisted, non-profiling, single-trace timing SCA, which successfully recovers the garbler’s input during the computation under different scenarios, including various GC frameworks, benchmark functions, and the number of garbler’s input bits. Furthermore, we discuss Gob- lin’s success factors and countermeasures against that. In doing so, Goblin hopefully paves the way for further research in this matter.
Metadata
- Available format(s)
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- Secure Function EvaluationTiming Side-channel AnalysisClusteringNon-profiling attackSingle-trace attack.
- Contact author(s)
-
mhashemi @ wpi edu
dforte @ ece ufl edu
fganji @ wpi edu - History
- 2023-07-23: last of 6 revisions
- 2023-01-01: received
- See all versions
- Short URL
- https://ia.cr/2023/001
- License
-
CC BY-NC-ND
BibTeX
@misc{cryptoeprint:2023/001, author = {Mohammad Hashemi and Domenic Forte and Fatemeh Ganji}, title = {Time is money, friend! Timing Side-channel Attack against Garbled Circuit Constructions}, howpublished = {Cryptology {ePrint} Archive, Paper 2023/001}, year = {2023}, url = {https://eprint.iacr.org/2023/001} }