Paper 2023/1198

Towards Achieving Provable Side-Channel Security in Practice

Sonia Belaïd, CryptoExperts (France)
Gaëtan Cassiers, TU Graz
Camille Mutschler, NinjaLab (France), LIRMM, Univ. Montpellier, CNRS, Montpellier, France
Matthieu Rivain, CryptoExperts (France)
Thomas Roche, NinjaLab (France)
François-Xavier Standaert, UCLouvain, ICTEAM, Crypto Group, Louvain-la-Neuve, Belgium
Abdul Rahman Taleb, CryptoExperts (France), Sorbonne University
Abstract

Physical side-channel attacks are powerful attacks that exploit a device's physical emanations to break the security of cryptographic implementations. Many countermeasures have been proposed against these attacks, especially the widely-used and efficient masking countermeasure. Nevertheless, proving the security of masked implementations is challenging. Current techniques rely on empirical approaches to validate the security of such implementations. On the other hand, the theoretical community introduced leakage models to provide formal proofs of the security of masked implementations. Meanwhile, these leakage models rely on physical assumptions that are difficult to satisfy in practice, and the literature lacks a clear framework to implement proven secure constructions on a physical device while preserving the proven security. In this paper, we present a complete methodology describing the steps to turn an abstract masking scheme proven secure in a theoretical leakage model into a physical implementation satisfying provable security against side-channel attacks in practice. We propose new tools to enforce or relax the physical assumptions the indeal noisy leakage model rely on and provide novel ways of including them in a physical implementation. We also highlight the design goals for an embedded device to reach high levels of proven security, discussing the limitations and open problems of the practical usability of the leakage models. Our goal is to show that it is possible to bridge theory and practice and to motivate further research to fully close the gap and get practical implementations proven secure against side-channel attacks on a physical device without any ideal assumption about the leakage.

Metadata
Available format(s)
PDF
Publication info
Preprint.
Keywords
maskingprovable side-channel securityrandom probing modelnoisy leakage modelmethodologyphysical assumptions
Contact author(s)
sonia belaid @ cryptoexperts com
gaetan cassiers @ iaik tugraz at
camille @ ninjalab io
matthieu rivain @ cryptoexperts com
thomas @ ninjalab io
francois-xavier standaert @ uclouvain be
abdul taleb @ cryptoexperts com
History
2023-08-07: approved
2023-08-07: received
See all versions
Short URL
https://ia.cr/2023/1198
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/1198,
      author = {Sonia Belaïd and Gaëtan Cassiers and Camille Mutschler and Matthieu Rivain and Thomas Roche and François-Xavier Standaert and Abdul Rahman Taleb},
      title = {Towards Achieving Provable Side-Channel Security in Practice},
      howpublished = {Cryptology ePrint Archive, Paper 2023/1198},
      year = {2023},
      note = {\url{https://eprint.iacr.org/2023/1198}},
      url = {https://eprint.iacr.org/2023/1198}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.