Coco:{Co-Design} and {Co-Verification} of masked software implementations on {CPUs}
30th USENIX Security Symposium (USENIX Security 21), 2021•usenix.org
The protection of cryptographic implementations against power analysis attacks is of critical
importance for many applications in embedded systems. The typical approach of protecting
against these attacks is to implement algorithmic countermeasures, like masking. However,
implementing these countermeasures in a secure and correct manner is challenging.
Masking schemes require the independent processing of secret shares, which is a property
that is often violated by CPU microarchitectures in practice. In order to write leakage-free …
importance for many applications in embedded systems. The typical approach of protecting
against these attacks is to implement algorithmic countermeasures, like masking. However,
implementing these countermeasures in a secure and correct manner is challenging.
Masking schemes require the independent processing of secret shares, which is a property
that is often violated by CPU microarchitectures in practice. In order to write leakage-free …
Abstract
The protection of cryptographic implementations against power analysis attacks is of critical importance for many applications in embedded systems. The typical approach of protecting against these attacks is to implement algorithmic countermeasures, like masking. However, implementing these countermeasures in a secure and correct manner is challenging. Masking schemes require the independent processing of secret shares, which is a property that is often violated by CPU microarchitectures in practice. In order to write leakage-free code, the typical approach in practice is to iteratively explore instruction sequences and to empirically verify whether there is leakage caused by the hardware for this instruction sequence or not. Clearly, this approach is neither efficient, nor does it lead to rigorous security statements.
usenix.org
以上显示的是最相近的搜索结果。 查看全部搜索结果