Projects per year
Abstract
Masking is a popular countermeasure to protect cryptographic implementations against physical attacks like differential power analysis. So far, research focused on Boolean masking for symmetric algorithms like AES and Keccak. With the advent of post-quantum cryptography (PQC), arithmetic masking has received increasing attention because many PQC algorithms require a combination of arithmetic and Boolean masking and respective conversion algorithms (A2B/B2A), which represent an interesting but very challenging research topic. While there already exist formal verification concepts for Boolean masked implementations, the same cannot be said about arithmetic masking and accompanying mask conversion algorithms.
In this work, we demonstrate the first formal verification approach for (any-order) Boolean and arithmetic masking which can be applied to both hardware and software, while considering side-effects such as glitches and transitions. First, we show how a formal verification approach for Boolean masking can be used in the context of arithmetic masking such that we can verify A2B/B2A conversions for arbitrary masking orders. We investigate various conversion algorithms in hardware and software, and point out several new findings such as glitch-based issues for straightforward implementations of Coron et al.-A2B in hardware, transition-based leakage in Goubin-A2B in software, and more general implementation pitfalls when utilizing common optimization techniques in PQC. We provide the first formal analysis of table-based A2Bs from a probing security perspective and point out that they might not be easy to implement securely on processors that use of memory buffers or caches.
In this work, we demonstrate the first formal verification approach for (any-order) Boolean and arithmetic masking which can be applied to both hardware and software, while considering side-effects such as glitches and transitions. First, we show how a formal verification approach for Boolean masking can be used in the context of arithmetic masking such that we can verify A2B/B2A conversions for arbitrary masking orders. We investigate various conversion algorithms in hardware and software, and point out several new findings such as glitch-based issues for straightforward implementations of Coron et al.-A2B in hardware, transition-based leakage in Goubin-A2B in software, and more general implementation pitfalls when utilizing common optimization techniques in PQC. We provide the first formal analysis of table-based A2Bs from a probing security perspective and point out that they might not be easy to implement securely on processors that use of memory buffers or caches.
Original language | English |
---|---|
Title of host publication | Applied Cryptography and Network Security |
Subtitle of host publication | 21st International Conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023, Proceedings, Part I |
Editors | M. Tibouchi, X. Wang |
Place of Publication | Cham |
Publisher | Springer |
Pages | 3-32 |
Number of pages | 30 |
ISBN (Electronic) | 978-3-031-33488-7 |
ISBN (Print) | 978-3-031-33487-0 |
DOIs | |
Publication status | Published - 29 May 2023 |
Event | 21st International Conference on Applied Cryptography and Network Security: ACNS 2023 - Kyoto, Japan Duration: 19 Jun 2023 → 22 Jun 2023 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Volume | 13905 |
Conference
Conference | 21st International Conference on Applied Cryptography and Network Security |
---|---|
Abbreviated title | ACNS 2023 |
Country/Territory | Japan |
City | Kyoto |
Period | 19/06/23 → 22/06/23 |
Fingerprint
Dive into the research topics of 'Formal Verification of Arithmetic Masking in Hardware and Software'. Together they form a unique fingerprint.Projects
- 2 Finished
-
-
Dependable Internet of Things
Boano, C. A., Kubin, G., Bloem, R., Horn, M., Pernkopf, F., Zakany, N., Mangard, S., Witrisal, K., Römer, K. U., Aichernig, B., Bösch, W., Baunach, M. C., Tappler, M., Malenko, M., Weiser, S., Eichlseder, M., Leitinger, E., Grosinger, J., Großwindhager, B., Ebrahimi, M., Alothman Alterkawi, A. B., Knoll, C., Teschl, R., Saukh, O., Rath, M., Steinberger, M., Steinbauer-Wagner, G. & Tranninger, M.
1/01/16 → 31/03/22
Project: Research project
Activities
- 1 Talk at conference or symposium
-
Formal Verification of Arithmetic Masking in Hardware and Software
Barbara Gigerl (Speaker)
20 Jun 2023Activity: Talk or presentation › Talk at conference or symposium › Science to science