Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model: Better Safe than Sorry

  • Gaëtan Cassiers ICTEAM/ELEN/Crypto Group, UCLouvain, Belgium
  • François-Xavier Standaert ICTEAM/ELEN/Crypto Group, UCLouvain, Belgium
Keywords: Side-Channel Analysis, Masking Countermeasure, Physical Defaults, Transition-Based leakages, Glitches, Robust Probing model, Composability

Abstract

There exists many masking schemes to protect implementations of cryptographic operations against side-channel attacks. It is common practice to analyze the security of these schemes in the probing model, or its variant which takes into account physical effects such as glitches and transitions. Although both effects exist in practice and cause leakage, masking schemes implemented in hardware are often only analyzed for security against glitches. In this work, we fill this gap by proving sufficient conditions for the security of hardware masking schemes against transitions, leading to the design of new masking schemes and a proof of security for an existing masking scheme in presence of transitions. Furthermore, we give similar results in the stronger model where the effects of glitches and transitions are combined.

Published
2021-02-23
How to Cite
Cassiers, G., & Standaert, F.-X. (2021). Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model: Better Safe than Sorry. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021(2), 136-158. https://doi.org/10.46586/tches.v2021.i2.136-158
Section
Articles