Paper 2024/1968
A Systematic Analysis of Pseudorandom Generation for Masked Cryptographic Implementation
Abstract
This study analyzes and investigates pseudorandom generation (PRG) in the context of masked cryptographic implementation. Although masking and PRGs have been distinctly studied for a long time, little literature studies how the randomness in the masked implementation should be generated. The lack of analysis on mask-bits generators makes the practical security of masked cryptographic implementation unclear, and practitioners (e.g., designers, implementers, and evaluators) may be confused about how to realize it. This study provides its systematic analysis by developing new three adversarial models, which correspond to respective practical scenarios of leakage assessment, quantitative evaluation of sidechannel security (e.g., success rate and key-lifetime), and practical deployment. We present the properties required for each scenario by a stage-by-stage analysis. In particular, we support a long-held belief/folklore with a proof: for the output of PRG for masking, cryptographic security is sufficient but unnecessary, but only a statistical uniformity (precisely, high-dimensional uniform equidistribution) is necessary. In addition, we thoroughly investigate the side-channel security of PRGs in the wild in the masking context. We conclude this study with some recommendations for practitioners and a proposal of leakage-resilient method of comparative performance.
Metadata
- Available format(s)
-
PDF
- Category
- Implementation
- Publication info
- Preprint.
- Keywords
- MaskingSide-channel attackPseudorandom generation
- Contact author(s)
-
ueno rei 2e @ kyoto-u ac jp
naofumi homma c8 @ tohoku ac jp
k-minematsu @ nec com - History
- 2025-04-10: last of 3 revisions
- 2024-12-05: received
- See all versions
- Short URL
- https://ia.cr/2024/1968
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/1968, author = {Rei Ueno and Naofumi Homma and Kazuhiko Minematsu}, title = {A Systematic Analysis of Pseudorandom Generation for Masked Cryptographic Implementation}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1968}, year = {2024}, url = {https://eprint.iacr.org/2024/1968} }