2020
DOI: 10.1007/978-3-030-45727-3_11
|View full text |Cite
|
Sign up to set email alerts
|

Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations

Abstract: Cryptographic implementations deployed in real world devices often aim at (provable) security against the powerful class of side-channel attacks while keeping reasonable performances. Last year at Asiacrypt, a new formal verification tool named tightPROVE was put forward to exactly determine whether a masked implementation is secure in the well-deployed probing security model for any given security order t. Also recently, a compiler named Usuba was proposed to automatically generate bitsliced implementations o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
10
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 27 publications
1
10
0
Order By: Relevance
“…when J is a given set with |J| t 2 and W is the output of LeakingWires(G, p) satisfies (10), which concludes the proof.…”
Section: A Proof Of Propositionsupporting
confidence: 52%
See 1 more Smart Citation
“…when J is a given set with |J| t 2 and W is the output of LeakingWires(G, p) satisfies (10), which concludes the proof.…”
Section: A Proof Of Propositionsupporting
confidence: 52%
“…Namely, verification tools are now able to produce a security proof or identify potential attacks from the description of a masked implementation at up to some masking orders (i.e., < 5) [4,14,11]. In the same vein, compilers have been built to automatically generate masked implementations at any order given the high level description of a primitive [5,11,10]. Nevertheless, no equivalent framework has yet been proposed to verify the security of implementations in the random probing model.…”
Section: Introductionmentioning
confidence: 99%
“…The fullVerif tool we propose is the first one that can verify the composability of concrete hardware implementations including glitches. The most similar tool is Tornado [31], which works for software implementations on micro-controllers. Some other works are less directly comparable, either because they span multiple table cells or because they aim at different goals.…”
Section: Related Workmentioning
confidence: 99%
“…Next, we give a list of papers that either evaluate the side-channel and fault resistance of Ascon or elaborate protection mechanisms against side-channel and fault attacks [4,7,12,[28][29][30]50,51,55,60,68,[77][78][79]83].…”
Section: Implementation Security and Robustnessmentioning
confidence: 99%