[Resource Topic] 2025/1858: Testing Security Equivalence in the Random Probing Model

Welcome to the resource topic for 2025/1858

Title:
Testing Security Equivalence in the Random Probing Model

Authors: Anna Guinet, Carina Graw, Lukas Koletzko, Jan Richter-Brockmann, Holger Dette, Tim Güneysu

Abstract:

The random probing model is a theoretical model that abstracts the physical leakage of an embedded device running a cryptographic scheme with more realistic assumptions compared to the threshold probing model. It assumes that the wires of the target device leak their assigned values with probability p, and the said values may reveal information about secret data, which could lead to a security violation. From that, we can compute the probability \epsilon that a side-channel adversary may learn secret data from any random combination of wires as a function of the number of wire combinations that breaches security with rate p. This model is used to evaluate the security of masked cryptographic implementations, or simply named circuits; and the research community has been focusing so far on approximating or estimating the probability \epsilon for one circuit. Yet, no proposition has been made to quickly compare the probability \epsilon of different circuits, e.g., a circuit and its optimized version. In this context, we present two statistical tests to make decisions about the level of security in the random probing model: the equivalence test compares the security of two circuits in terms of \epsilon's and the superiority test decides whether the undetermined \epsilon of one circuit falls below a security threshold \epsilon_0, both with quantified uncertainty about the computations of the probabilities \epsilon's. The validity of these tests is proven mathematically sound and verified via empirical studies on small masked S-boxes.

ePrint: https://eprint.iacr.org/2025/1858

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .