首页> 外文会议>Annual international conference on the theory and applications of cryptographic techniques >Making Masking Security Proofs Concrete Or How to Evaluate the Security of Any Leaking Device
【24h】

Making Masking Security Proofs Concrete Or How to Evaluate the Security of Any Leaking Device

机译:使掩蔽安全证明具体化或如何评估任何泄漏设备的安全性

获取原文

摘要

We investigate the relationships between theoretical studies of leaking cryptographic devices and concrete security evaluations with standard side-channel attacks. Our contributions are in four parts. First, we connect the formal analysis of the masking countermeasure proposed by Duc et al. (Eurocrypt 2014) with the Eurocrypt 2009 evaluation framework for side-channel key recovery attacks. In particular, we re-state their main proof for the masking countermeasure based on a mutual information metric, which is frequently used in concrete physical security evaluations. Second, we discuss the tightness of the Eurocrypt 2014 bounds based on experimental case studies. This allows us to conjecture a simplified link between the mutual information metric and the success rate of a side-channel adversary, ignoring technical parameters and proof artifacts. Third, we introduce heuristic (yet well-motivated) tools for the evaluation of the masking countermeasure when its independent leakage assumption is not perfectly fulfilled, as it is frequently encountered in practice. Thanks to these tools, we argue that masking with non-independent leakages may provide improved security levels in certain scenarios. Eventually, we consider the tradeoff between measurement complexity and key enumeration in divide-and-conquer side-channel attacks, and show that it can be predicted based on the mutual information metric, by solving a non-linear integer programming problem for which efficient solutions exist. The combination of these observations enables significant reductions of the evaluation costs for certification bodies.
机译:我们调查了泄漏密码设备的理论研究与采用标准边信道攻击的具体安全评估之间的关系。我们的贡献分为四个部分。首先,我们连接了Duc等人提出的掩盖对策的形式分析。 (Eurocrypt 2014)和用于侧通道密钥恢复攻击的Eurocrypt 2009评估框架。特别是,我们重申了其基于相互信息度量的掩蔽对策的主要证据,该度量经常在具体的物理安全评估中使用。其次,基于实验案例研究,我们讨论了Eurocrypt 2014界限的严密性。这使我们可以推测互信息量度与边路对手的成功率之间的简化链接,而无需考虑技术参数和证明工件。第三,当在实践中经常遇到的独立泄漏假设不能完全满足时,我们引入启发式(动机良好)的工具来评估掩蔽对策。由于有了这些工具,我们认为在某些情况下使用非独立泄漏进行屏蔽可能会提高安全级别。最终,我们考虑了分治网络侧信道攻击中度量复杂度与密钥枚举之间的折衷,并表明可以通过解决非线性整数规划问题来基于互信息量进行预测,该非线性整数规划问题可以通过有效的解决方案来解决。存在。这些观察结果的结合可以显着降低认证机构的评估成本。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号