May 29, 2023, 1:10 a.m. | Mingyang Liu, Fu Song, Taolue Chen

cs.CR updates on arXiv.org arxiv.org

Masking is a widely-used effective countermeasure against power side-channel
attacks for implementing cryptographic algorithms. Surprisingly, few formal
verification techniques have addressed a fundamental question, i.e., whether
the masked program and the original (unmasked) cryptographic algorithm are
functional equivalent. In this paper, we study this problem for masked
arithmetic programs over Galois fields of characteristic 2. We propose an
automated approach based on term rewriting, aided by random testing and SMT
solving. The overall approach is sound, and complete under certain …

algorithm algorithms attacks automated channel correctness masking power problem program question side-channel side-channel attacks study techniques unmasked verification

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)