Consolidating security notions in hardware masking

L De Meyer, B Bilgin, O Reparaz - IACR Transactions on …, 2019 - tches.iacr.org
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019tches.iacr.org
In this paper, we revisit the security conditions of masked hardware implementations. We
describe a new, succinct, information-theoretic condition called d-glitch immunity which is
both necessary and sufficient for security in the presence of glitches. We show that this
single condition includes, but is not limited to, previous security notions such as those used
in higher-order threshold implementations and in abstractions using ideal gates. As
opposed to these previously known necessary conditions, our new condition is also …
Abstract
In this paper, we revisit the security conditions of masked hardware implementations. We describe a new, succinct, information-theoretic condition called d-glitch immunity which is both necessary and sufficient for security in the presence of glitches. We show that this single condition includes, but is not limited to, previous security notions such as those used in higher-order threshold implementations and in abstractions using ideal gates. As opposed to these previously known necessary conditions, our new condition is also sufficient. On the other hand, it excludes avoidable notions such as uniformity. We also treat the notion of (strong) noninterference from an information-theoretic point-of-view in order to unify the different security concepts and pave the way to the verification of composability in the presence of glitches. We conclude the paper by demonstrating how the condition can be used as an efficient and highly generic flaw detection mechanism for a variety of functions and schemes based on different operations.
tches.iacr.org
以上显示的是最相近的搜索结果。 查看全部搜索结果