Chapter

Cryptographic Hardware and Embedded Systems -- CHES 2015

Volume 9293 of the series Lecture Notes in Computer Science pp 475-494

Date:

Multi-variate High-Order Attacks of Shuffled Tables Recomputation

  • Nicolas BruneauAffiliated withTELECOM-ParisTech, Crypto GroupSTMicroelectronics, AST Division Email author 
  • , Sylvain GuilleyAffiliated withTELECOM-ParisTech, Crypto GroupSecure-IC S.A.S.
  • , Zakaria NajmAffiliated withTELECOM-ParisTech, Crypto Group
  • , Yannick TegliaAffiliated withSTMicroelectronics, AST Division

* Final gross prices may vary according to local VAT.

Get Access

Abstract

Masking schemes based on tables recomputation are classical countermeasures against high-order side-channel attacks. Still, they are known to be attackable at order d in the case the masking involves d shares. In this work, we mathematically show that an attack of order strictly greater than d can be more successful than an attack at order d. To do so, we leverage the idea presented by Tunstall, Whitnall and Oswald at FSE 2013: we exhibit attacks which exploit the multiple leakages linked to one mask during the recomputation of tables. Specifically, regarding first-order table recomputation, improved by a shuffled execution, we show that there is a window of opportunity, in terms of noise variance, where a novel highly multivariate third-order attack is more efficient than a classical bivariate second-order attack. Moreover, we show on the example of the high-order secure table computation presented by Coron at EUROCRYPT 2014 that the window of opportunity enlarges linearly with the security order d.

Keywords

Shuffled table recomputation Highly multivariate high-order attacks Signal-to-noise ratio