2023
DOI: 10.46586/tches.v2023.i2.155-179
|View full text |Cite
|
Sign up to set email alerts
|

Threshold Implementations in Software: Micro-architectural Leakages in Algorithms

Abstract: This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the literature. The resulting notions, which are based on the placement of shares, are applied to a two-share randomness-free PRESENT cipher and Keccak-f. The assembly implementations are put on a RISC-V and an ARM Cortex-M4 core. All designs are validated in the glitch and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…On the other hand, our second-order implementation can pass the TVLA test of 100,000 traces, which indicates that leakage in the first-order design might be caused by unexpected equipment behavior. As pointed out and organized in [GD23], probing security cannot capture the physical defaults of devices. Glitches and transition-based leakage concerning the Hamming distance between two consecutive values written in a memory cell can cause power consumption related to the unmasked secret.…”
Section: Discussion About the Leakage Of The First-order Designmentioning
confidence: 99%
“…On the other hand, our second-order implementation can pass the TVLA test of 100,000 traces, which indicates that leakage in the first-order design might be caused by unexpected equipment behavior. As pointed out and organized in [GD23], probing security cannot capture the physical defaults of devices. Glitches and transition-based leakage concerning the Hamming distance between two consecutive values written in a memory cell can cause power consumption related to the unmasked secret.…”
Section: Discussion About the Leakage Of The First-order Designmentioning
confidence: 99%
“…Some leakage-focused requirements for share transfer. Gaspoz and Dhooghe [GD23] introduce what they term horizontal [GD23, Definition 5] and vertical [GD23, Definition 6] non-completeness requirements on the representation of variables: their goal is to prevent unintentional share recombination that might stem from inter-and intra-register interaction respectively. One could imagine attempting to introduce analogous requirements to guide the transfer of shares between memory and the register file.…”
Section: Discussionmentioning
confidence: 99%
“…The first step in this direction is the adaption of non-completeness to cover at least a subset of micro-architectural effects. Gaspoz et al [GD22] summarized their observations in the following lemmas.…”
Section: Probing Securitymentioning
confidence: 99%
“…However, the practical leakage of masked software strongly depends on the (often secret) design of the CPU. Moreover, fulfilling Lemma 1 and Lemma 2 does only protect against micro-architectural issues considered in [GD22] while every other micro-architectural effect needs additional consideration.…”
Section: Probing Securitymentioning
confidence: 99%
See 1 more Smart Citation