From theory to practice of private circuit: A cautionary note

作者: Debapriya Basu Roy , Shivam Bhasin , Sylvain Guilley , Jean-Luc Danger , Debdeep Mukhopadhyay

DOI: 10.1109/ICCD.2015.7357117

关键词: Electronic circuitPass transistor logicComputer securityField-programmable gate arrayLogic gateDigital electronicsLogic optimizationComputer scienceSequential logicProgrammable logic deviceCombinational logicBoolean circuitProgrammable logic arrayNOR logic

摘要: Private circuits, from their publication, have been really popular among the researchers. They also form basis for provable masking schemes. There are several works which try to improve results of bit-level private circuits based on 2-input gates combinational logic. However, strangely, no practical side-channel analysis has presented so far, is focus present paper. In this paper, we tried identify ‘ambush’ or hidden dangers in implementation can compromise its security scenarios. We implemented block cipher SIMON with circuit and performed it. The result shows that, practice, there significant amount information leakage be exploited by adversaries. Some comes optimization applied standard CAD tools, if they restructure netlists. But even immutable netlists, caused a kind glitch known as early evaluation. Lastly, demonstrate how translate theoretically secure practically added overhead, clocking every gate. Leakage detection tests attest considered variants circuits.

参考文章(25)
Jungmin Park, Akhilesh Tyagi, t-Private Systems: Unified Private Memories and Computation Space. pp. 285- 302 ,(2014) , 10.1007/978-3-319-12060-7_19
Jean-Sébastien Coron, Johann Großschädl, Praveen Kumar Vadnala, Secure Conversion between Boolean and Arithmetic Masking of Any Order cryptographic hardware and embedded systems. pp. 188- 205 ,(2014) , 10.1007/978-3-662-44709-3_11
Ali Galip Bayrak, Francesco Regazzoni, David Novo, Paolo Ienne, Sleuth: Automated Verification of Software Power Analysis Countermeasures Cryptographic Hardware and Embedded Systems - CHES 2013. pp. 293- 310 ,(2013) , 10.1007/978-3-642-40349-1_17
Gilles Piret, Thomas Roche, Claude Carlet, PICARO – A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance Applied Cryptography and Network Security. pp. 311- 328 ,(2012) , 10.1007/978-3-642-31284-7_19
Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub, Verified Proofs of Higher-Order Masking theory and application of cryptographic techniques. pp. 457- 485 ,(2015) , 10.1007/978-3-662-46800-5_18
Zachary N. Goddard, Nicholas LaJeunesse, Thomas Eisenbarth, Power analysis of the t-private logic style for FPGAs hardware oriented security and trust. pp. 68- 71 ,(2015) , 10.1109/HST.2015.7140239
Eric Brier, Christophe Clavier, Francis Olivier, Correlation Power Analysis with a Leakage Model Lecture Notes in Computer Science. pp. 16- 29 ,(2004) , 10.1007/978-3-540-28632-5_2
Yuval Ishai, Amit Sahai, David Wagner, Private Circuits: Securing Hardware against Probing Attacks Advances in Cryptology - CRYPTO 2003. pp. 463- 481 ,(2003) , 10.1007/978-3-540-45146-4_27
Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall, Compiler assisted masking cryptographic hardware and embedded systems. ,vol. 7428, pp. 58- 75 ,(2012) , 10.1007/978-3-642-33027-8_4
B. Gérard, Vincent Grosso, M. Naya-Plasencia, François-Xavier Standaert, Block Ciphers That Are Easier to Mask: How Far Can We Go? Cryptographic Hardware and Embedded Systems - CHES 2013. ,vol. 2013, pp. 383- 399 ,(2013) , 10.1007/978-3-642-40349-1_22