Generation and Verification of Masking Countermeasures Against Side-Channel Atta...
Generation and Verification of Masking Countermeasures Against Side-Channel Attacks
Cryptography is everywhere in our daily life to ensure the confidentiality and authentication of our communications and the integrity of our records. Although there are strong expectations regarding the security of cryptographic s...
ver más
¿Tienes un proyecto y buscas un partner? Gracias a nuestro motor inteligente podemos recomendarte los mejores socios y ponerte en contacto con ellos. Te lo explicamos en este video
Proyectos interesantes
SEAL
Sound and Early Assessment of Leakage for Embedded Software
2M€
Cerrado
SWORD
Security Without Obscurity for Reliable Devices
2M€
Cerrado
SecuStack
SecuStack: Securing the Leaky Hardware/Software Boundary
2M€
Cerrado
REASSURE
Robust and Efficient Approaches to Evaluating Side Channel a...
4M€
Cerrado
CNTM
Cryptography on Non Trusted Machines
873K€
Cerrado
Información proyecto AMAskZONE
Duración del proyecto: 68 meses
Fecha Inicio: 2022-12-16
Fecha Fin: 2028-08-31
Líder del proyecto
CRYPTOEXPERTS SAS
No se ha especificado una descripción o un objeto social para esta compañía.
TRL
4-5
Presupuesto del proyecto
1M€
Fecha límite de participación
Sin fecha límite de participación.
Descripción del proyecto
Cryptography is everywhere in our daily life to ensure the confidentiality and authentication of our communications and the integrity of our records. Although there are strong expectations regarding the security of cryptographic schemes against black-box attackers whose knowledge is restricted to a few inputs or outputs, the security of their implementations is less challenged. However, once implemented on embedded devices, cryptographic schemes become vulnerable to powerful side-channel attacks. The latter additionally exploit the physical leakage (e.g., power consumption) released by the device to recover the manipulated secrets. With cheap equipment, side-channel attacks may yield tremendous damage (e.g., full key recovery) within seconds. Nevertheless, the current security level of countermeasures is not yet close to that achieved in the black-box model.
The community is divided on how to assess the security of cryptographic implementations. From practitioners’ perspective, they need to be confronted with concrete side-channel attacks directly on embedded devices. Conversely, theorists consider that such an empirical approach is not portable and does not yield concrete security levels (e.g., not all attacks can be tested). Therefore, they instead investigate security proofs based on abstract leakage models, although the latter are often too far removed from reality to yield practical security.
In this project, I plan to combine the advantages of both worlds with a toolbox to generate and verify cryptographic implementations with practical security. Namely, I aim to:
(i) design new compilers to turn any high-level algorithm into an efficient implementation proven secure for identified concrete devices,
(ii) push the limits of formal verification with device characterization and polynomial complexity for industrial use.
The main challenge of AMAskZONE is to design and verify cryptographic implementations so that they achieve measurable practical security.