Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks - Département Communications et Electronique Accéder directement au contenu
Article Dans Une Revue IEEE Transactions on Information Forensics and Security Année : 2022

Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks

Résumé

Code-based masking is a recent line of research on masking schemes aiming at provably counteracting side-channel attacks. It generalizes and unifies many masking schemes within a coding-theoretic formalization. In code-based masking schemes, the tuning parameters are the underlying linear codes, whose choice significantly affects the side-channel resilience. In this paper, we investigate the exploitability of the information leakage in code-based masking and present attack-based evaluation results of higher-order optimal distinguisher (HOOD). Particularly, we consider two representative instances of code-based masking, namely inner product masking (IPM) and Shamir’s secret sharing (SSS) based masking. Our results do confirm the state-of-the-art theoretical derivatives in an empirical manner with numerically simulated measurements. Specifically, theoretical results are based on quantifying information leakage; we further complete the panorama with attack-based evaluations by investigating the exploitability of the leakage. Moreover, we classify all possible candidates of linear codes in IPM with 2 and 3 shares and (3, 1)-SSS based masking, and highlight both optimal and worst codes for them. Relying on our empirical evaluations, we therefore recommend investigating the coding-theoretic properties to find the best linear codes in strengthening instances of code-based masking. As for applications, our attack-based evaluation directly empowers designers, by employing optimal linear codes, to enhance the protection of code-based masking. Our framework leverages simulated leakage traces, hence allowing for source code validation or patching in case it is found to be attackable.
Fichier principal
Vignette du fichier
21_attack_cbm_tifs_clean.pdf (610.47 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-03633061 , version 1 (06-04-2022)

Identifiants

Citer

Wei Cheng, Sylvain Guilley, Jean-Luc Danger. Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks. IEEE Transactions on Information Forensics and Security, inPress, 17, pp.1624-1638. ⟨10.1109/TIFS.2022.3167914⟩. ⟨hal-03633061⟩
120 Consultations
19 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More