Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model: Better Safe than Sorry

Authors

  • Gaëtan Cassiers ICTEAM/ELEN/Crypto Group, UCLouvain, Belgium
  • François-Xavier Standaert ICTEAM/ELEN/Crypto Group, UCLouvain, Belgium

DOI:

https://doi.org/10.46586/tches.v2021.i2.136-158

Keywords:

Side-Channel Analysis, Masking Countermeasure, Physical Defaults, Transition-Based leakages, Glitches, Robust Probing model, Composability

Abstract

There exists many masking schemes to protect implementations of cryptographic operations against side-channel attacks. It is common practice to analyze the security of these schemes in the probing model, or its variant which takes into account physical effects such as glitches and transitions. Although both effects exist in practice and cause leakage, masking schemes implemented in hardware are often only analyzed for security against glitches. In this work, we fill this gap by proving sufficient conditions for the security of hardware masking schemes against transitions, leading to the design of new masking schemes and a proof of security for an existing masking scheme in presence of transitions. Furthermore, we give similar results in the stronger model where the effects of glitches and transitions are combined.

Downloads

Published

2021-02-23

How to Cite

Cassiers, G., & Standaert, F.-X. . (2021). Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model: Better Safe than Sorry. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021(2), 136–158. https://doi.org/10.46586/tches.v2021.i2.136-158

Issue

Section

Articles