Description
The masking countermeasure constitutes a provably secure approach against side-channel attacks. Nonetheless, in the software context, the micro-architecture underlying a given CPU potentially induces information leakages undermining the masking's proven security.
In this seminar, I will present the research work developed during my Ph.D. at CEA-List in Grenoble. This work addresses, along two axes, the problem of developing practically secure masked software.
The first axis targets the automated generation of masked software resilient to transition-based leakages, putting forward the employment of register allocation and instruction scheduling to mitigate such leakages during the compilation of the masked software.
The second axis focuses on the impact of the micro-architecture on alternative types of masking, studying their potential employment as a micro-architecture-independent approach to protect software implementations against both transition-based leakages and data parallelism; this latter an unexplored topic for masked software implementations.
I will conclude the seminar highlighting key points concerning the development of practically secure masked software and potential future developments of my research work.
Next sessions
-
Sécurité physique du mécanisme d'encapsulation de clé Classic McEliece
Speaker : Brice Colombier - Laboratoire Hubert Curien, Université Jean Monnet, Saint-Étienne
Le mécanisme d'encapsulation de clé Classic McEliece faisait partie des candidats toujours en lice au dernier tour du processus de standardisation de la cryptographie post-quantique initié par le NIST en 2016. Fondé sur les codes correcteurs d'erreurs, en particulier autour du cryptosystème de Niederreiter, sa sécurité n'a pas été fondamentalement remise en cause. Néanmoins, un aspect important du[…]-
SemSecuElec
-
Implementation of cryptographic algorithm
-