Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model: Better Safe than Sorry
DOI:
https://doi.org/10.46586/tches.v2021.i2.136-158Keywords:
Side-Channel Analysis, Masking Countermeasure, Physical Defaults, Transition-Based leakages, Glitches, Robust Probing model, ComposabilityAbstract
There exists many masking schemes to protect implementations of cryptographic operations against side-channel attacks. It is common practice to analyze the security of these schemes in the probing model, or its variant which takes into account physical effects such as glitches and transitions. Although both effects exist in practice and cause leakage, masking schemes implemented in hardware are often only analyzed for security against glitches. In this work, we fill this gap by proving sufficient conditions for the security of hardware masking schemes against transitions, leading to the design of new masking schemes and a proof of security for an existing masking scheme in presence of transitions. Furthermore, we give similar results in the stronger model where the effects of glitches and transitions are combined.
Downloads
Published
Issue
Section
License
Copyright (c) 2021 Gaëtan Cassiers, François-Xavier Standaert
This work is licensed under a Creative Commons Attribution 4.0 International License.