CAPA: the spirit of Beaver against physical attacks Oscar Reparaz, - - PowerPoint PPT Presentation

capa the spirit of beaver against physical attacks
SMART_READER_LITE
LIVE PREVIEW

CAPA: the spirit of Beaver against physical attacks Oscar Reparaz, - - PowerPoint PPT Presentation

CAPA: the spirit of Beaver against physical attacks Oscar Reparaz, Lauren De Meyer, Victor Arribas, Begul Bilgin, Svetla Nikova, Venzi Nikov, Nigel Smart COSIC KU Leuven University of Bristol NXP Semiconductors Problem statement 2 (Johann


slide-1
SLIDE 1

CAPA: the spirit of Beaver against physical attacks

Oscar Reparaz, Lauren De Meyer, Victor Arribas, Begul Bilgin, Svetla Nikova, Venzi Nikov, Nigel Smart

COSIC KU Leuven University of Bristol NXP Semiconductors

slide-2
SLIDE 2

Problem statement

2

slide-3
SLIDE 3

(Johann Heyszl)

slide-4
SLIDE 4

Problem statement

4

  • Implementation of crypto in a hostile environment
  • This paper: adapt MPC protocols to run in

hardware

slide-5
SLIDE 5

Masking / ISW Duplication in time / space SPDZ MASCOT Masking + duplication FHE? randomized circuit layout Circuit meshes Light / glitch detectors Balanced logic In-circuit noise generators countermeasures for
 physical attacks MPC BODZ Tiny-OT

slide-6
SLIDE 6

Masking / ISW Duplication in time / space SPDZ MASCOT Masking + duplication FHE? randomized circuit layout Circuit meshes Light / glitch detectors Balanced logic In-circuit noise generators countermeasures for
 physical attacks MPC BODZ Tiny-OT

slide-7
SLIDE 7

Masking / ISW Duplication in time / space SPDZ MASCOT Masking + duplication FHE? randomized circuit layout Circuit meshes Light / glitch detectors Balanced logic In-circuit noise generators countermeasures for
 physical attacks MPC BODZ Tiny-OT

slide-8
SLIDE 8

Adversarial model: tile fault-and-probe

8

Tile I Tile II Tile III Tile IV Tile party

slide-9
SLIDE 9

Adversarial model: tile fault-and-probe

9

Tile I Tile II Tile III Tile IV Tile party

Adversarially controlled

slide-10
SLIDE 10

Adversarial model: SCA

  • Adversary is allowed to probe all intermediates

within a set of tiles (all except one). Values are disclosed with probability 1

  • Related to the noisy leakage model

10

slide-11
SLIDE 11

Adversarial model: FA

  • A. known value fault in any

intermediate within up to (d-1)-tiles

  • powerful, inherited by

SPDZ

  • B. random fault everywhere
  • very relevant for HW
  • There is fine print: static
  • adversary. notion of time:

computation periods

11

slide-12
SLIDE 12

Adversarial model: FA

  • A. known value fault in any

intermediate within up to (d-1)-tiles

  • powerful, inherited by

SPDZ

  • B. random fault everywhere
  • very relevant for HW
  • There is fine print: static
  • adversary. notion of time:

computation periods

12

≈ ≈

(J-M Schmidt, M. Hutter)

slide-13
SLIDE 13
slide-14
SLIDE 14
slide-15
SLIDE 15

Current countermeasures

  • Orthogonal topics: side-channel protection + fault

protection

  • A few combined attacks (more difficult)

15

slide-16
SLIDE 16

Different worlds - analogies and differences

Party Tile in the silicon expensive communication channel wires on the circuit local memory cheap reduced storage adversary controls arbitrarily some parties, can plot arbitrary attacks

adversary external, controls somehow some parties, DFA mostly (bit flips, set, clear)

slide-17
SLIDE 17

CAPA

  • How to represent data
  • How to perform computation

17

slide-18
SLIDE 18

CAPA: data representation

  • Handle (shares of data, shares of MAC tag)
  • shares of data = Boolean shares of data
  • MAC tag: multiplicative tag
  • shares of MAC tag: Boolean shares of the tag

18

Main idea: attach an info-theoretical MAC to each piece of data

slide-19
SLIDE 19

CAPA: data representation

  • Handle (shares of data, shares of MAC tag)
  • shares of data = additive secret sharing
  • MAC tag: multiplicative tag
  • shares of MAC tag: Boolean shares of the tag

19

Main idea: attach an info-theoretical MAC to each piece of data

slide-20
SLIDE 20

CAPA: data representation

  • Handle (shares of data, shares of MAC tag)
  • shares of data = additive shares of data
  • MAC tag: multiplicative tag
  • shares of MAC tag: Boolean shares of the tag

20

Main idea: attach an info-theoretical MAC to each piece of data

slide-21
SLIDE 21

CAPA: data representation

  • Handle (shares of data, shares of MAC tag)
  • shares of data = additive shares of data
  • MAC tag: multiplicative tag
  • shares of MAC tag: additive shares of the tag

21

Main idea: attach an info-theoretical MAC to each piece of data

slide-22
SLIDE 22

CAPA: computation

  • Linear operations are easy
  • Multiplication
  • A. Blinding
  • B. Partial unmasking
  • C. MAC tag checking
  • D. Beaver step

22

slide-23
SLIDE 23

CAPA: computation

  • Linear operations are easy
  • Multiplication
  • A. Blinding
  • B. Partial unmasking
  • C. MAC tag checking
  • D. Beaver step

23

Inputs

Auxiliary data

slide-24
SLIDE 24

CAPA: computation

24

  • A. Blinding

eps3 eps2 t t

tile 2 tile 3

eps1 t

tile 1

slide-25
SLIDE 25

CAPA: computation

25

  • B. Partial unmasking

Broadcast shares of eps to unmask the value each broadcasting needs a synchronization element

eps3 eps2 t t

tile 2 tile 3

eps1 t

tile 1

eps eps eps

slide-26
SLIDE 26

CAPA: computation

26

  • C. MAC tag checking

Are partially unmasked values
 consistent with their tags? broadcast verify is zero

eps3 eps2 t t

tile 2 tile 3

eps1 t

tile 1

eps eps eps t t t

slide-27
SLIDE 27

CAPA: computation

27

  • D. Beaver computation

The actual multiplication (local)

z3 z2 t t

tile 2 tile 3

z1 t

tile 1

slide-28
SLIDE 28

CAPA: PRE computation

  • Auxiliary data needed for multiplication
  • Generate using a passively secure multiplier
  • Relation verification step

28

slide-29
SLIDE 29

Security guarantees

  • Side-channels: the union of d-1 tiles doesn't disclose any

secret -> (d-1)-order DPA attacks

  • Fault attacks: the fault is undetected if both value and

accompanying tag are modified to be consistent. Probability that an adversary controlling d-1 tiles is bounded -> (d-1)-shot FA

  • Detection probability does not depend on the number of

faulty bits or Hamming weight of injected faults

  • Combined adversary: inherit from MPC. Not all combined

adversaries are covered (we're not using commitments)

29

slide-30
SLIDE 30

Some attacks

  • Glitch on power supply or clock line
  • Depends on the underlying HW architecture
  • Skipping instructions
  • Detected when checking partiaully unmasked

values

  • Flipping values
  • Safe error attacks

30

slide-31
SLIDE 31

Implementations:
 AES in HW

31

Primitives: Inversion: 4 cycles, 3 exponentiation triples and 1 quintuple Affine: 1 cycle. Total 5-stage pipeline

slide-32
SLIDE 32

Implementations: AES in HW

32

slide-33
SLIDE 33
slide-34
SLIDE 34

KATAN: 2 shares

slide-35
SLIDE 35

KATAN: 3 shares

slide-36
SLIDE 36

Bitsliced AES in SW

36

slide-37
SLIDE 37

Conclusions

  • A step towards porting modern MPC to achieve

resistance against physical attacks

  • Future work
  • Cheaper ways to generate auxiliary data
  • Do not need all machinery of MPC

37