Paper 2023/883

Prouff & Rivain’s Formal Security Proof of Masking, Revisited: Tight Bounds in the Noisy Leakage Model

Loïc Masure, ICTEAM Institute, Université catholique de Louvain, Louvain-la-Neuve, Belgium
François-Xavier Standaert, ICTEAM Institute, Université catholique de Louvain, Louvain-la-Neuve, Belgium
Abstract

Masking is a counter-measure that can be incorporated to software and hardware implementations of block ciphers to provably se- cure them against side-channel attacks. The security of masking can be proven in different types of threat models. In this paper, we are interested in directly proving the security in the most realistic threat model, the so-called noisy leakage adversary, that captures well how real-world side- channel adversaries operate. Direct proofs in this leakage model have been established by Prouff & Rivain at Eurocrypt 2013, Dziembowski et al. at Eurocrypt 2015, and Prest et al. at Crypto 2019. Both proofs are complementary to each other, in the sense that the weaknesses of one proof are fixed in at least one of the others, and conversely. These weak- nesses concerned in particular the strong requirements on the noise level and the security parameter to get meaningful security bounds, and some requirements on the type of adversary covered by the proof — i.e., cho- sen or random plaintexts. This suggested that the drawbacks of each security bound could actually be proof artifacts. In this paper, we solve these issues, by revisiting Prouff & Rivain’s approach.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published by the IACR in CRYPTO 2023
Keywords
MaskingISWside-channel
Contact author(s)
loic masure @ uclouvain be
fstandae @ uclouvain be
History
2023-06-12: approved
2023-06-08: received
See all versions
Short URL
https://ia.cr/2023/883
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/883,
      author = {Loïc Masure and François-Xavier Standaert},
      title = {Prouff & Rivain’s Formal Security Proof of Masking, Revisited: Tight Bounds in the Noisy Leakage Model},
      howpublished = {Cryptology ePrint Archive, Paper 2023/883},
      year = {2023},
      note = {\url{https://eprint.iacr.org/2023/883}},
      url = {https://eprint.iacr.org/2023/883}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.