Quantile: Quantifying Information Leakage

Vedad Hadzic, Gaëtan Cassiers, Robert Primas, Stefan Mangard, Roderick Bloem

Research output: Contribution to conferencePaperpeer-review

Abstract

The masking countermeasure is very effective against side-channel attacks
such as differential power analysis. However, the design of masked circuits is a
challenging problem since one has to ensure security while minimizing performance
overheads. The security of masking is often studied in the t-probing model, and
multiple formal verification tools can verify this notion. However, these tools generally
cannot verify large masked computations due to computational complexity.
We introduce a new verification tool named Quantile, which performs randomized
simulations of the masked circuit in order to bound the mutual information between
the leakage and the secret variables. Our approach ensures good scalability with the
circuit size and results in proven statistical security bounds. Further, our bounds
are quantitative and, therefore, more nuanced than t-probing security claims: by
bounding the amount of information contained in the lower-order leakage, Quantile
can evaluate the security provided by masking even when they are not 1-probing
secure, i.e., when they are classically considered as insecure. As an example, we apply
Quantile to masked circuits of Prince and AES, where randomness is aggressively
reused.
Original languageEnglish
Publication statusPublished - 31 Dec 2023

Keywords

  • Side-channel attacks
  • Masking
  • Verification

Fingerprint

Dive into the research topics of 'Quantile: Quantifying Information Leakage'. Together they form a unique fingerprint.

Cite this