Redundant Code-based Masking Revisited
Masking schemes are a popular countermeasure against side-channel attacks. To mask bytes, the two classical options are Boolean masking and polynomial masking. The latter lends itself to redundant masking, where leakage emanates from more shares than are strictly necessary to reconstruct, raising t...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2020-12-01
|
Series: | Transactions on Cryptographic Hardware and Embedded Systems |
Subjects: | |
Online Access: | https://ojs-dev.ub.rub.de/index.php/TCHES/article/view/8740 |
id |
doaj-3a15ee5ced874014919929ad1d763ffc |
---|---|
record_format |
Article |
spelling |
doaj-3a15ee5ced874014919929ad1d763ffc2021-02-03T15:50:01ZengRuhr-Universität BochumTransactions on Cryptographic Hardware and Embedded Systems2569-29252020-12-0120211Redundant Code-based Masking RevisitedNicolas Costes0Martijn Stam1Simula UiB, Merkantilen (3rd floor), Thormøhlensgate 53D, N-5006 Bergen, NorwaySimula UiB, Merkantilen (3rd floor), Thormøhlensgate 53D, N-5006 Bergen, Norway Masking schemes are a popular countermeasure against side-channel attacks. To mask bytes, the two classical options are Boolean masking and polynomial masking. The latter lends itself to redundant masking, where leakage emanates from more shares than are strictly necessary to reconstruct, raising the obvious question how well such “redundant” leakage can be exploited by a side-channel adversary. We revisit the recent work by Chabanne et al. (CHES’18) and show that, contrary to their conclusions, said leakage can—in theory—always be exploited. For the Hamming weight scenario in the low-noise regime, we heuristically determine how security degrades in terms of the number of redundant shares for first and second order secure polynomial masking schemes. Furthermore, we leverage a well-established link between linear secret sharing schemes and coding theory to determine when different masking schemes will end up with essentially equivalent leakage profiles. Surprisingly, we conclude that for typical field sizes and security orders, Boolean masking is a special case of polynomial masking. We also identify quasi-Boolean masking schemes as a special class of redundant polynomial masking and point out that the popular “Frobenius-stable” sets of interpolations points typically lead to such quasi-Boolean masking schemes, with subsequent degraded leakage performance. https://ojs-dev.ub.rub.de/index.php/TCHES/article/view/8740Coding TheoryMaskingShamir Secret SharingSuccess Rate |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Nicolas Costes Martijn Stam |
spellingShingle |
Nicolas Costes Martijn Stam Redundant Code-based Masking Revisited Transactions on Cryptographic Hardware and Embedded Systems Coding Theory Masking Shamir Secret Sharing Success Rate |
author_facet |
Nicolas Costes Martijn Stam |
author_sort |
Nicolas Costes |
title |
Redundant Code-based Masking Revisited |
title_short |
Redundant Code-based Masking Revisited |
title_full |
Redundant Code-based Masking Revisited |
title_fullStr |
Redundant Code-based Masking Revisited |
title_full_unstemmed |
Redundant Code-based Masking Revisited |
title_sort |
redundant code-based masking revisited |
publisher |
Ruhr-Universität Bochum |
series |
Transactions on Cryptographic Hardware and Embedded Systems |
issn |
2569-2925 |
publishDate |
2020-12-01 |
description |
Masking schemes are a popular countermeasure against side-channel attacks. To mask bytes, the two classical options are Boolean masking and polynomial masking. The latter lends itself to redundant masking, where leakage emanates from more shares than are strictly necessary to reconstruct, raising the obvious question how well such “redundant” leakage can be exploited by a side-channel adversary. We revisit the recent work by Chabanne et al. (CHES’18) and show that, contrary to their conclusions, said leakage can—in theory—always be exploited. For the Hamming weight scenario in the low-noise regime, we heuristically determine how security degrades in terms of the number of redundant shares for first and second order secure polynomial masking schemes.
Furthermore, we leverage a well-established link between linear secret sharing schemes and coding theory to determine when different masking schemes will end up with essentially equivalent leakage profiles. Surprisingly, we conclude that for typical field sizes and security orders, Boolean masking is a special case of polynomial masking. We also identify quasi-Boolean masking schemes as a special class of redundant polynomial masking and point out that the popular “Frobenius-stable” sets of interpolations points typically lead to such quasi-Boolean masking schemes, with subsequent degraded leakage performance.
|
topic |
Coding Theory Masking Shamir Secret Sharing Success Rate |
url |
https://ojs-dev.ub.rub.de/index.php/TCHES/article/view/8740 |
work_keys_str_mv |
AT nicolascostes redundantcodebasedmaskingrevisited AT martijnstam redundantcodebasedmaskingrevisited |
_version_ |
1724286496302694400 |