Journal of Cryptographic Engineering
pp 1-16
First online:
Formally proved security of assembly code against power analysis
- Pablo RauzyAffiliated withInstitut Mines-TélécomTélécom ParisTechCNRS LTCI Email author
- , Sylvain GuilleyAffiliated withInstitut Mines-TélécomTélécom ParisTechCNRS LTCI
- , Zakaria NajmAffiliated withInstitut Mines-TélécomTélécom ParisTechCNRS LTCI
Rent the article at a discount
Rent now* Final gross prices may vary according to local VAT.
Get AccessAbstract
In his keynote speech at CHES 2004, Kocher advocated that side-channel attacks were an illustration that formal cryptography was not as secure as it was believed because some assumptions (e.g., no auxiliary information is available during the computation) were not modeled. This failure is caused by formal methods’ focus on models rather than implementations. In this paper, we present formal methods and tools for designing protected code and proving its security against power analysis. These formal methods avoid the discrepancy between the model and the implementation by working on the latter rather than on a high-level model. Indeed, our methods allow us (a) to automatically insert a power balancing countermeasure directly at the assembly level, and to prove the correctness of the induced code transformation; and (b) to prove that the obtained code is balanced with regard to a reasonable leakage model. We also show how to characterize the hardware to use the resources which maximize the relevancy of the model. The tools implementing our methods are then demonstrated in a case study on an 8-bit AVR smartcard for which we generate a provably protected present implementation that reveals to be at least 250 times more resistant to CPA attacks.
Keywords
Dual-rail with precharge logic (DPL) Formal proof Static analysis Symbolic execution Implementation DPA CPA Smartcard PRESENT Block cipher Hamming distance OCaml- Title
- Formally proved security of assembly code against power analysis
- Journal
-
Journal of Cryptographic Engineering
- DOI
- 10.1007/s13389-015-0105-2
- Print ISSN
- 2190-8508
- Online ISSN
- 2190-8516
- Publisher
- Springer Berlin Heidelberg
- Additional Links
- Topics
- Keywords
-
- Dual-rail with precharge logic (DPL)
- Formal proof
- Static analysis
- Symbolic execution
- Implementation
- DPA
- CPA
- Smartcard
- PRESENT
- Block cipher
- Hamming distance
- OCaml
- Industry Sectors
- Authors
-
-
Pablo Rauzy
(1)
(2)
(3)
-
Sylvain Guilley
(1)
(2)
(3)
-
Zakaria Najm
(1)
(2)
(3)
-
Pablo Rauzy
- Author Affiliations
-
- 1. Institut Mines-Télécom, Paris, France
- 2. Télécom ParisTech, Paris, France
- 3. CNRS LTCI, Paris, France
-