Paper 2025/1202

t-Probing (In-)Security - Pitfalls on Noise Assumptions

Dina Hesse, Ruhr University Bochum
Jakob Feldtkeller, Ruhr University Bochum
Tim Güneysu, Ruhr University Bochum
Julius Hermelink, Max Planck Institute for Security and Privacy
Georg Land, Intel (United States)
Markus Krausz, TÜV Informationstechnik GmbH
Jan Richter-Brockmann, Ruhr University Bochum
Abstract

The ongoing transition to post-quantum cryptography has led to a surge of research in side-channel countermeasures tailored to these schemes. A prominent method to prove security in the context of side-channel analysis is the utilization of the well-established t-probing model. However, recent studies by Hermelink et al. at CCS 2024 demonstrate a simple and practical attack on a provably secure implementation of the Fujisaki-Okamoto transform that raises concerns regarding the practical security of t-probing secure schemes. In this paper, we present an unsupervised single-trace side-channel attack on a tenth order masked implementation of fixed-weight polynomial sampling, which has also been proven to be secure in the t-probing model. Both attacks reveal a mismatch between the correct, well-understood theory of the t-probing model and its practical application, since the security proofs are valid, yet the attacks still succeed at high noise levels. Therefore, we take a closer look at the underlying causes and the assumptions that are made for transferring t-probing security to practice. In particular, we investigate the amount of noise required for this transfer. We find that, depending on the design decisions made, this can be very high and difficult to achieve. Consequently, we examine the factors impacting the required amount of noise and that should be considered for practically secure implementations. In particular, non-uniformly distributed shares - a setting that is increasingly encountered in post-quantum cryptographic algorithms - could lead to an increased noise requirement, and thus it could reduce the security level of the masking scheme. Our analysis then allows us to provide practical guidelines for implementation designers, thereby facilitating the development of practically secure designs.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
t-probing modelSCAPQCMaskingMutual InformationNoise
Contact author(s)
dina hesse @ rub de
jakob feldtkeller @ rub de
tim gueneysu @ rub de
julius hermelink @ mpi-sp org
mail @ georg land
m krausz @ tuvit de
jan richter-brockmann @ rub de
History
2025-06-30: approved
2025-06-27: received
See all versions
Short URL
https://ia.cr/2025/1202
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/1202,
      author = {Dina Hesse and Jakob Feldtkeller and Tim Güneysu and Julius Hermelink and Georg Land and Markus Krausz and Jan Richter-Brockmann},
      title = {t-Probing (In-)Security - Pitfalls on Noise Assumptions},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/1202},
      year = {2025},
      url = {https://eprint.iacr.org/2025/1202}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.