Side-channel attacks extracting sensitive data from implementations have been considered a major threat to the security of cryptographic schemes. This has elevated the need for improved designs by embodying countermeasures, with masking being the most prominent example. To formally verify the security of a masking scheme, numerous attack models have been developed to capture the physical properties of the information leakage as well as the capabilities of the adversary. With regard to these models, extensive research has been performed to realize masking schemes. These research efforts have led to significant progress in the development of security assessment methodologies and further initiated standardization activities. However, since the majority of this work is theoretical, it is challenging for the more practice-oriented hardware security community to fully grasp and contribute to. To bridge the gap, these advancements are reviewed and discussed in this survey, mainly from the perspective of hardware security. In doing so, a clear taxonomy is provided that is helpful for a systematic treatment of the masking-related topics. By giving an extensive overview of the existing methods, this survey (1) provides a research landscape of circuit masking for newcomers to the field, (2) offers guidelines on which attack model and verification tool to choose when designing masking schemes, and (3) identifies interesting new research directions where masking models and assessment tools can be applied. Thus, this survey serves as an essential reference for hardware security practitioners interested in the theory behind masking techniques, the tools useful to verify the security of masked circuits, and their potential applications.


翻译:从执行过程中提取敏感数据的侧面攻击,被认为是对加密系统安全的重大威胁,这增加了改进设计的需要,具体做法是体现反措施,以掩盖为最突出的例子。为正式核查遮蔽装置的安全性,已经开发了许多攻击模型,以捕捉信息泄漏的物理性质以及对手的能力。关于这些模型,已经进行了广泛的研究,以实现遮蔽装置。这些研究工作导致在制订安全评估方法和进一步开展标准化活动方面取得了重大的进展。然而,由于这项工作大部分是理论性的,对更注重实践的硬件安全界来说,要充分掌握和作出贡献是具有挑战性的。为弥合差距,主要从硬件安全角度审查和讨论这些进展。为此,提供了明确的分类学,有助于系统地处理掩蔽相关专题。通过对现有方法进行广泛的概述,这一调查(1)为外地新来者提供了电路掩蔽技术的研究前景。(2)为设计安全掩蔽工具时,可以选择攻击模型和核查工具背后的潜在安全掩码,从而确定安全掩码,从而在设计安全勘测过程中选择一种有意义的安全掩码工具。(3)

0
下载
关闭预览

相关内容

[综述]深度学习下的场景文本检测与识别
专知会员服务
77+阅读 · 2019年10月10日
【哈佛大学商学院课程Fall 2019】机器学习可解释性
专知会员服务
103+阅读 · 2019年10月9日
【SIGGRAPH2019】TensorFlow 2.0深度学习计算机图形学应用
专知会员服务
39+阅读 · 2019年10月9日
已删除
将门创投
5+阅读 · 2019年5月5日
Arxiv
14+阅读 · 2020年2月6日
A Comprehensive Survey on Transfer Learning
Arxiv
120+阅读 · 2019年11月7日
VIP会员
相关资讯
已删除
将门创投
5+阅读 · 2019年5月5日
Top
微信扫码咨询专知VIP会员