Abstract
AbstractIn the context of side-channel attacks against cryptographic circuits, t-probing security characterizes the amount of information derivable about sensitive values (e.g., keys) by observing t output/internal values. Non-interference is a useful mathematical tool used by researchers to assess the probing security of a circuit which employs Boolean masking to protect itself from attacks. However, reasoning about non-interference still requires either difficult ratiocination or complex automatic tools. In this work, we propose a novel point of view to reason about non-interference, by exploiting the Walsh transform of a Boolean function. To this end, we introduce a calculus for mechanically reasoning about the shares of a variable and show that this formalism provides a lean algebraic explanation of known compositional patterns allowing for the discovery of new ones. Eventually, we show how this formalism can be applied to study the probing security of known cryptographic gadgets.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference27 articles.
1. Lecture Notes in Computer Science;Y Ishai,2003
2. Lecture Notes in Computer Science;J Coron,2014
3. Barthe, G., Belaïd , S., Dupressoir , F., Fouque P. A., Grégoire, B., Strub, P. Y., Zucchini R.: Strong Non-Interference and Type-Directed Higher-Order Masking. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS ’16, pages 116–129, New York, NY, USA, (2016). ACM
4. Barthe, G., Belaïd, S., Dupressoir, F., Fouque, P.A., Grégoire, B.: Compositional verification of higher-order masking: application to a verifying masking compiler. IACR Cryptol. ePrint Arch. 2015, 506 (2015)
5. Belaïd, S., Dahmun G., and Matthieu R.: Tight private circuits: achieving probing security with the least refreshing. Technical Report 439, (2018)