CAPA: the spirit of Beaver against physical attacks
Oscar Reparaz, Lauren De Meyer, Victor Arribas, Begul Bilgin, Svetla Nikova, Venzi Nikov, Nigel Smart
COSIC KU Leuven University of Bristol NXP Semiconductors
CAPA: the spirit of Beaver against physical attacks Oscar Reparaz, - - PowerPoint PPT Presentation
CAPA: the spirit of Beaver against physical attacks Oscar Reparaz, Lauren De Meyer, Victor Arribas, Begul Bilgin, Svetla Nikova, Venzi Nikov, Nigel Smart COSIC KU Leuven University of Bristol NXP Semiconductors Problem statement 2 (Johann
Oscar Reparaz, Lauren De Meyer, Victor Arribas, Begul Bilgin, Svetla Nikova, Venzi Nikov, Nigel Smart
COSIC KU Leuven University of Bristol NXP Semiconductors
2
(Johann Heyszl)
4
hardware
Masking / ISW Duplication in time / space SPDZ MASCOT Masking + duplication FHE? randomized circuit layout Circuit meshes Light / glitch detectors Balanced logic In-circuit noise generators countermeasures for physical attacks MPC BODZ Tiny-OT
Masking / ISW Duplication in time / space SPDZ MASCOT Masking + duplication FHE? randomized circuit layout Circuit meshes Light / glitch detectors Balanced logic In-circuit noise generators countermeasures for physical attacks MPC BODZ Tiny-OT
Masking / ISW Duplication in time / space SPDZ MASCOT Masking + duplication FHE? randomized circuit layout Circuit meshes Light / glitch detectors Balanced logic In-circuit noise generators countermeasures for physical attacks MPC BODZ Tiny-OT
8
Tile I Tile II Tile III Tile IV Tile party
≈
9
Tile I Tile II Tile III Tile IV Tile party
≈
Adversarially controlled
within a set of tiles (all except one). Values are disclosed with probability 1
10
intermediate within up to (d-1)-tiles
SPDZ
computation periods
11
intermediate within up to (d-1)-tiles
SPDZ
computation periods
12
(J-M Schmidt, M. Hutter)
protection
15
Party Tile in the silicon expensive communication channel wires on the circuit local memory cheap reduced storage adversary controls arbitrarily some parties, can plot arbitrary attacks
adversary external, controls somehow some parties, DFA mostly (bit flips, set, clear)
17
18
Main idea: attach an info-theoretical MAC to each piece of data
19
Main idea: attach an info-theoretical MAC to each piece of data
20
Main idea: attach an info-theoretical MAC to each piece of data
21
Main idea: attach an info-theoretical MAC to each piece of data
22
23
Inputs
Auxiliary data
24
eps3 eps2 t t
tile 2 tile 3
eps1 t
tile 1
25
Broadcast shares of eps to unmask the value each broadcasting needs a synchronization element
eps3 eps2 t t
tile 2 tile 3
eps1 t
tile 1
eps eps eps
26
Are partially unmasked values consistent with their tags? broadcast verify is zero
eps3 eps2 t t
tile 2 tile 3
eps1 t
tile 1
eps eps eps t t t
27
The actual multiplication (local)
z3 z2 t t
tile 2 tile 3
z1 t
tile 1
28
secret -> (d-1)-order DPA attacks
accompanying tag are modified to be consistent. Probability that an adversary controlling d-1 tiles is bounded -> (d-1)-shot FA
faulty bits or Hamming weight of injected faults
adversaries are covered (we're not using commitments)
29
values
30
31
Primitives: Inversion: 4 cycles, 3 exponentiation triples and 1 quintuple Affine: 1 cycle. Total 5-stage pipeline
32
36
resistance against physical attacks
37