2018
DOI: 10.1007/s00145-018-9277-0
|View full text |Cite
|
Sign up to set email alerts
|

Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
115
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 89 publications
(117 citation statements)
references
References 64 publications
2
115
0
Order By: Relevance
“…More precisely, if an implementation obtained by applying the compiler in [ISW03] is secure at order n in the probing model, then [DFS15,Theorem 3] shows that the success probability of distinguishing the correct key among |K| candidates is bounded above by |K| · 2 −n/9 if the leakage L i on each intermediate variable X i satisfies:…”
Section: Introductionmentioning
confidence: 99%
“…More precisely, if an implementation obtained by applying the compiler in [ISW03] is secure at order n in the probing model, then [DFS15,Theorem 3] shows that the success probability of distinguishing the correct key among |K| candidates is bounded above by |K| · 2 −n/9 if the leakage L i on each intermediate variable X i satisfies:…”
Section: Introductionmentioning
confidence: 99%
“…In the previous section, we have shown with Theorems 9 and 10 that the two models (bit-level probing and bounded moments) are equivalent, which motivates to consider the probing model at bit level (as opposed to at word level, as done in many papers (to cite a few: [16,19]). We give hereafter some examples of masking with codes at bit-level.…”
Section: Illustration For Some Coding-based Masking Schemesmentioning
confidence: 94%
“…Duc, Dziembowski and Faust [17] show that proving probing security allows one to estimate the practical (noisy leakage) security of a masked algorithm. While Duc, Faust and Standaert [18] empirically show that some of the factors of Duc et al's bound [17] are likely proof artefacts, the remainder of the bound, and in particular a factor that includes the size of the circuit, seems to be tight. Intuitively, Duc et al [18] essentially show that the probing security order gives an indication of the smallest order moment of the distribution over leakage traces that contains information about the secret, whereas the size of the circuit the adversary can probe is an indicator of how easy it is to evaluate higher-order moments.…”
Section: Adversary and Leakage Models For Maskingmentioning
confidence: 99%