A Statistical Verification Method of Random Permutations for Hiding Countermeasure Against Side-Channel Attacks

Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo-Gyeong Kang, Yasuyuki Kachi, Kouichi Sakurai
{"title":"A Statistical Verification Method of Random Permutations for Hiding Countermeasure Against Side-Channel Attacks","authors":"Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo-Gyeong Kang, Yasuyuki Kachi, Kouichi Sakurai","doi":"10.48550/arXiv.2311.08625","DOIUrl":null,"url":null,"abstract":"As NIST is putting the final touches on the standardization of PQC (Post Quantum Cryptography) public key algorithms, it is a racing certainty that peskier cryptographic attacks undeterred by those new PQC algorithms will surface. Such a trend in turn will prompt more follow-up studies of attacks and countermeasures. As things stand, from the attackers' perspective, one viable form of attack that can be implemented thereupon is the so-called\"side-channel attack\". Two best-known countermeasures heralded to be durable against side-channel attacks are:\"masking\"and\"hiding\". In that dichotomous picture, of particular note are successful single-trace attacks on some of the NIST's PQC then-candidates, which worked to the detriment of the former:\"masking\". In this paper, we cast an eye over the latter:\"hiding\". Hiding proves to be durable against both side-channel attacks and another equally robust type of attacks called\"fault injection attacks\", and hence is deemed an auspicious countermeasure to be implemented. Mathematically, the hiding method is fundamentally based on random permutations. There has been a cornucopia of studies on generating random permutations. However, those are not tied to implementation of the hiding method. In this paper, we propose a reliable and efficient verification of permutation implementation, through employing Fisher-Yates' shuffling method. We introduce the concept of an n-th order permutation and explain how it can be used to verify that our implementation is more efficient than its previous-gen counterparts for hiding countermeasures.","PeriodicalId":13158,"journal":{"name":"IACR Cryptol. ePrint Arch.","volume":"27 5","pages":"1750"},"PeriodicalIF":0.0000,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IACR Cryptol. ePrint Arch.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.48550/arXiv.2311.08625","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

As NIST is putting the final touches on the standardization of PQC (Post Quantum Cryptography) public key algorithms, it is a racing certainty that peskier cryptographic attacks undeterred by those new PQC algorithms will surface. Such a trend in turn will prompt more follow-up studies of attacks and countermeasures. As things stand, from the attackers' perspective, one viable form of attack that can be implemented thereupon is the so-called"side-channel attack". Two best-known countermeasures heralded to be durable against side-channel attacks are:"masking"and"hiding". In that dichotomous picture, of particular note are successful single-trace attacks on some of the NIST's PQC then-candidates, which worked to the detriment of the former:"masking". In this paper, we cast an eye over the latter:"hiding". Hiding proves to be durable against both side-channel attacks and another equally robust type of attacks called"fault injection attacks", and hence is deemed an auspicious countermeasure to be implemented. Mathematically, the hiding method is fundamentally based on random permutations. There has been a cornucopia of studies on generating random permutations. However, those are not tied to implementation of the hiding method. In this paper, we propose a reliable and efficient verification of permutation implementation, through employing Fisher-Yates' shuffling method. We introduce the concept of an n-th order permutation and explain how it can be used to verify that our implementation is more efficient than its previous-gen counterparts for hiding countermeasures.
针对侧信道攻击的隐藏对策的随机排列统计验证方法
由于 NIST 正在对 PQC(后量子密码学)公钥算法的标准化进行最后的润色,因此可以肯定的是,那些新的 PQC 算法无法阻止的更棘手的密码攻击将会浮出水面。这种趋势反过来又会促使对攻击和对策进行更多的后续研究。目前,从攻击者的角度来看,一种可行的攻击形式就是所谓的 "侧信道攻击"。有两种最著名的反制措施被认为可以有效抵御侧信道攻击,它们是:"掩蔽 "和 "隐藏"。在这种二分法中,特别值得注意的是对 NIST 当时的一些 PQC 候选产品的成功单痕量攻击,这对前者不利:"掩蔽"。在本文中,我们关注的是后者:"隐藏"。事实证明,"隐藏 "既能抵御侧信道攻击,也能抵御另一种同样强大的攻击--"故障注入攻击",因此被认为是一种可以实施的有效对策。从数学上讲,隐藏方法的基础是随机排列。关于生成随机排列的研究层出不穷。然而,这些研究与隐藏方法的实施并不相关。在本文中,我们通过使用 Fisher-Yates 的洗牌方法,提出了一种可靠、高效的排列实现验证方法。我们引入了 n 阶排列组合的概念,并解释了如何利用它来验证我们的实现比以前的同类隐藏对策更有效。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信