Hiding Higher-Order Side-Channel Leakage. Sasdrich, P., Moradi, A., & Güneysu, T. In Topics in Cryptology – CT-RSA 2017, volume 10159, pages 131–146. Springer International Publishing, Cham, 2017.
Hiding Higher-Order Side-Channel Leakage [link]Paper  doi  abstract   bibtex   
First-order secure Threshold Implementations (TI) of symmetric cryptosystems provide provable security at a moderate overhead; yet attacks using higher-order statistical moments are still feasible. Cryptographic instances compliant to Higher-Order Threshold Implementation (HO-TI) can prevent such attacks, however, usually at unacceptable implementation costs. As an alternative concept we investigate in this work the idea of dynamic hardware modification, i.e., random changes and transformations of cryptographic implementations in order to render higher-order attacks on first-order TI impractical. In a first step, we present a generic methodology which can be applied to (almost) every cryptographic implementation. In order to investigate the effectiveness of our proposed strategy, we use an instantiation of our methodology that adapts ideas from White-Box Cryptography and applies this construction to a first-order secure TI. Further, we show that dynamically updating cryptographic implementations during operation provides the ability to avoid higher-order leakages to be practically exploitable.
@incollection{handschuh_hiding_2017,
	address = {Cham},
	title = {Hiding {Higher}-{Order} {Side}-{Channel} {Leakage}},
	volume = {10159},
	isbn = {978-3-319-52152-7 978-3-319-52153-4},
	url = {http://link.springer.com/10.1007/978-3-319-52153-4_8},
	abstract = {First-order secure Threshold Implementations (TI) of symmetric cryptosystems provide provable security at a moderate overhead; yet attacks using higher-order statistical moments are still feasible. Cryptographic instances compliant to Higher-Order Threshold Implementation (HO-TI) can prevent such attacks, however, usually at unacceptable implementation costs. As an alternative concept we investigate in this work the idea of dynamic hardware modification, i.e., random changes and transformations of cryptographic implementations in order to render higher-order attacks on first-order TI impractical. In a first step, we present a generic methodology which can be applied to (almost) every cryptographic implementation. In order to investigate the effectiveness of our proposed strategy, we use an instantiation of our methodology that adapts ideas from White-Box Cryptography and applies this construction to a first-order secure TI. Further, we show that dynamically updating cryptographic implementations during operation provides the ability to avoid higher-order leakages to be practically exploitable.},
	language = {en},
	urldate = {2019-02-18},
	booktitle = {Topics in {Cryptology} – {CT}-{RSA} 2017},
	publisher = {Springer International Publishing},
	author = {Sasdrich, Pascal and Moradi, Amir and Güneysu, Tim},
	editor = {Handschuh, Helena},
	year = {2017},
	doi = {10.1007/978-3-319-52153-4_8},
	pages = {131--146},
}

Downloads: 0