Redundant Code-based Masking Revisited

Masking schemes are a popular countermeasure against side-channel attacks. To mask bytes, the two classical options are Boolean masking and polynomial masking. The latter lends itself to redundant masking, where leakage emanates from more shares than are strictly necessary to reconstruct, raising t...

Full description

Bibliographic Details
Main Authors: Nicolas Costes, Martijn Stam
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2020-12-01
Series:Transactions on Cryptographic Hardware and Embedded Systems
Subjects:
Online Access:https://ojs-dev.ub.rub.de/index.php/TCHES/article/view/8740
id doaj-3a15ee5ced874014919929ad1d763ffc
record_format Article
spelling doaj-3a15ee5ced874014919929ad1d763ffc2021-02-03T15:50:01ZengRuhr-Universität BochumTransactions on Cryptographic Hardware and Embedded Systems2569-29252020-12-0120211Redundant Code-based Masking RevisitedNicolas Costes0Martijn Stam1Simula UiB, Merkantilen (3rd floor), Thormøhlensgate 53D, N-5006 Bergen, NorwaySimula UiB, Merkantilen (3rd floor), Thormøhlensgate 53D, N-5006 Bergen, Norway Masking schemes are a popular countermeasure against side-channel attacks. To mask bytes, the two classical options are Boolean masking and polynomial masking. The latter lends itself to redundant masking, where leakage emanates from more shares than are strictly necessary to reconstruct, raising the obvious question how well such “redundant” leakage can be exploited by a side-channel adversary. We revisit the recent work by Chabanne et al. (CHES’18) and show that, contrary to their conclusions, said leakage can—in theory—always be exploited. For the Hamming weight scenario in the low-noise regime, we heuristically determine how security degrades in terms of the number of redundant shares for first and second order secure polynomial masking schemes. Furthermore, we leverage a well-established link between linear secret sharing schemes and coding theory to determine when different masking schemes will end up with essentially equivalent leakage profiles. Surprisingly, we conclude that for typical field sizes and security orders, Boolean masking is a special case of polynomial masking. We also identify quasi-Boolean masking schemes as a special class of redundant polynomial masking and point out that the popular “Frobenius-stable” sets of interpolations points typically lead to such quasi-Boolean masking schemes, with subsequent degraded leakage performance. https://ojs-dev.ub.rub.de/index.php/TCHES/article/view/8740Coding TheoryMaskingShamir Secret SharingSuccess Rate
collection DOAJ
language English
format Article
sources DOAJ
author Nicolas Costes
Martijn Stam
spellingShingle Nicolas Costes
Martijn Stam
Redundant Code-based Masking Revisited
Transactions on Cryptographic Hardware and Embedded Systems
Coding Theory
Masking
Shamir Secret Sharing
Success Rate
author_facet Nicolas Costes
Martijn Stam
author_sort Nicolas Costes
title Redundant Code-based Masking Revisited
title_short Redundant Code-based Masking Revisited
title_full Redundant Code-based Masking Revisited
title_fullStr Redundant Code-based Masking Revisited
title_full_unstemmed Redundant Code-based Masking Revisited
title_sort redundant code-based masking revisited
publisher Ruhr-Universität Bochum
series Transactions on Cryptographic Hardware and Embedded Systems
issn 2569-2925
publishDate 2020-12-01
description Masking schemes are a popular countermeasure against side-channel attacks. To mask bytes, the two classical options are Boolean masking and polynomial masking. The latter lends itself to redundant masking, where leakage emanates from more shares than are strictly necessary to reconstruct, raising the obvious question how well such “redundant” leakage can be exploited by a side-channel adversary. We revisit the recent work by Chabanne et al. (CHES’18) and show that, contrary to their conclusions, said leakage can—in theory—always be exploited. For the Hamming weight scenario in the low-noise regime, we heuristically determine how security degrades in terms of the number of redundant shares for first and second order secure polynomial masking schemes. Furthermore, we leverage a well-established link between linear secret sharing schemes and coding theory to determine when different masking schemes will end up with essentially equivalent leakage profiles. Surprisingly, we conclude that for typical field sizes and security orders, Boolean masking is a special case of polynomial masking. We also identify quasi-Boolean masking schemes as a special class of redundant polynomial masking and point out that the popular “Frobenius-stable” sets of interpolations points typically lead to such quasi-Boolean masking schemes, with subsequent degraded leakage performance.
topic Coding Theory
Masking
Shamir Secret Sharing
Success Rate
url https://ojs-dev.ub.rub.de/index.php/TCHES/article/view/8740
work_keys_str_mv AT nicolascostes redundantcodebasedmaskingrevisited
AT martijnstam redundantcodebasedmaskingrevisited
_version_ 1724286496302694400