Paper 2023/1198

A Methodology to Achieve Provable Side-Channel Security in Real-World Implementations

Sonia Belaïd, CryptoExperts (France)
Gaëtan Cassiers, TU Graz
Camille Mutschler, NinjaLab (France), LIRMM, Univ. Montpellier, CNRS, Montpellier, France
Matthieu Rivain, CryptoExperts (France)
Thomas Roche, NinjaLab (France)
François-Xavier Standaert, UCLouvain, ICTEAM, Crypto Group, Louvain-la-Neuve, Belgium
Abdul Rahman Taleb, CryptoExperts (France), Sorbonne University
Abstract

A wide range of countermeasures have been proposed to defend against side-channel attacks, with masking being one of the most effective and commonly used techniques. While theoretical models provide formal security proofs, these often rely on assumptions—sometimes implicit—that can be difficult to assess in practice. As a result, the design of secure masked implementations frequently combines proven theoretical arguments with heuristic and empirical validation. Despite the significant body of work, the literature still lacks a cohesive and well-defined framework for translating theoretical security guarantees into practical implementations on physical devices. Specifically, there remains a gap in connecting provable results from abstract models to quantitative security guarantees at the implementation level. In this Systematization of Knowledge (SoK), we aim to provide a comprehensive methodology to transform abstract cryptographic algorithms into physically secure implementations against side-channel attacks on microcontrollers. We introduce new tools to adapt the ideal noisy leakage model to practical, real-world scenarios, and we integrate state-of-the-art techniques to build secure implementations based on this model. Our work systematizes the design objectives necessary for achieving high security levels in embedded devices and identifies the remaining challenges in concretely applying security reductions. By bridging the gap between theory and practice, we seek to provide a foundation for future research that can develop implementations with proven security against side-channel attacks, based on well- understood leakage assumptions.

Metadata
Available format(s)
PDF
Publication info
Published by the IACR in CIC 2025
Keywords
maskingprovable side-channel securityrandom probing modelnoisy leakage modelmethodologyphysical assumptions
Contact author(s)
sonia belaid @ cryptoexperts com
gaetan cassiers @ iaik tugraz at
camille @ ninjalab io
matthieu rivain @ cryptoexperts com
thomas @ ninjalab io
francois-xavier standaert @ uclouvain be
abdul taleb @ cryptoexperts com
History
2025-04-04: last of 2 revisions
2023-08-07: received
See all versions
Short URL
https://ia.cr/2023/1198
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/1198,
      author = {Sonia Belaïd and Gaëtan Cassiers and Camille Mutschler and Matthieu Rivain and Thomas Roche and François-Xavier Standaert and Abdul Rahman Taleb},
      title = {A Methodology to Achieve Provable Side-Channel Security in Real-World Implementations},
      howpublished = {Cryptology {ePrint} Archive, Paper 2023/1198},
      year = {2023},
      url = {https://eprint.iacr.org/2023/1198}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.