Paper 2022/965
PROLEAD - A Probing-Based Hardware Leakage Detection Tool
Abstract
Even today, SCA attacks pose a serious threat to the security of cryptographic implementations fabricated with low-power and nano-scale feature technologies. Fortunately, the masking countermeasures offer reliable protection against such attacks based on simple security assumptions. However, the practical application of masking to a cryptographic algorithm is not trivial, and the designer may overlook possible security flaws, especially when masking a complex circuit. Moreover, abstract models like probing security allow formal verification tools to evaluate masked implementations. However, this is computationally too expensive when dealing with circuits that are not based on composable gadgets. Unfortunately, using composable gadgets comes at some area overhead. As a result, such tools can only evaluate subcircuits, not their compositions, which can become the Achilles' heel of such masked implementations. In this work, we apply logic simulations to evaluate the security of masked implementations which are not necessarily based on composable gadgets. We developed PROLEAD, an automated tool analyzing the statistical independence of simulated intermediates probed by a robust probing adversary. Compared to the state of the art, our approach (1) does not require any power model as only the state of a gate-level netlist is simulated, (2) can handle masked full cipher implementations, and (3) can detect flaws related to the combined occurrence of glitches and transitions as well as higher-order multivariate leakages. With PROLEAD, we can evaluate masked implementations that are too complex for existing formal verification tools while being in line with the robust probing model. Through PROLEAD, we have detected security flaws in several publicly-available masked implementations, which have been claimed to be robust probing secure.
Note: PROLEAD is available via GitHub: https://github.com/ChairImpSec/PROLEAD
Metadata
- Available format(s)
- Category
- Applications
- Publication info
- Published by the IACR in TCHES 2022
- Keywords
- Side-Channel Analysis Leakage Detection Probing Security Hardware
- Contact author(s)
-
nicolai mueller @ rub de
amir moradi @ rub de - History
- 2022-07-28: approved
- 2022-07-27: received
- See all versions
- Short URL
- https://ia.cr/2022/965
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/965, author = {Nicolai Müller and Amir Moradi}, title = {{PROLEAD} - A Probing-Based Hardware Leakage Detection Tool}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/965}, year = {2022}, url = {https://eprint.iacr.org/2022/965} }