International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Unifying Leakage Models: From Probing Attacks to Noisy Leakage

Authors:
Alexandre Duc
Stefan Dziembowski
Sebastian Faust
Download:
DOI: 10.1007/s00145-018-9284-1
Search ePrint
Search Google
Abstract: A recent trend in cryptography is to formally show the leakage resilience of cryptographic implementations in a given leakage model. One of the most prominent leakage model—the so-called bounded leakage model—assumes that the amount of leakage that an adversary receives is a-priori bounded. Unfortunately, it has been pointed out by several works that the assumption of bounded leakages is hard to verify in practice. A more realistic assumption is to consider that leakages are sufficiently noisy, following the engineering observation that real-world physical leakages are inherently perturbed by physical noise. While already the seminal work of Chari et al. (in: CRYPTO, pp 398–412, 1999 ) study security of side-channel countermeasures in the noisy model, only recently Prouff and Rivain (in: Johansson T, Nguyen PQ (eds) EUROCRYPT, volume 7881 of lecture notes in 931 computer science, pp 142–159, Springer, 2013 ) offer a full formal analysis of the masking countermeasure in a physically motivated noise model. In particular, the authors show that a block-cipher implementation that uses the Boolean masking scheme is secure against a very general class of noisy leakage functions. While this is an important step toward better understanding the security of masking schemes, the analysis of Prouff and Rivain has several shortcomings including in particular requiring leak-free gates. In this work, we provide an alternative security proof in the same noise model that overcomes these challenges. We achieve this goal by a new reduction from noisy leakage to the important model of probing adversaries (Ishai et al. in: CRYPTO, pp 463–481, 2003 ). This reduction is the main technical contribution of our work that significantly simplifies the formal security analysis of masking schemes against realistic side-channel leakages.
BibTeX
@article{jofc-2019-30151,
  title={Unifying Leakage Models: From Probing Attacks to Noisy Leakage},
  journal={Journal of Cryptology},
  publisher={Springer},
  volume={32},
  pages={151-177},
  doi={10.1007/s00145-018-9284-1},
  author={Alexandre Duc and Stefan Dziembowski and Sebastian Faust},
  year=2019
}