6 CONCLUSION AND FUTURE
WORK
We presented VerifMSI, a practical tool implemented
as a python library for verifying masking schemes im-
plementations. It extends the existing LeakageVerif
tool with constructs targeting hardware implementa-
tions, and enriches it with the verification of four se-
curity properties (NI, SNI, RNI, PINI). The experi-
ments presented in the article, focusing on 9 hardware
schemes, show that VerifMSI is able to successfully
verify many implementations from the literature, for
masking orders of up to 7 shares.
Future work includes enriching the software side
of VerifMSI with support for Galois Field operations,
as well as implementing less common security prop-
erties, and in particular the ones defined in the random
probing model. We also plan to write the core of Ver-
ifMSI in a compiled language to reduce the cost of
enumeration.
REFERENCES
Barthe, G., Belaïd, S., Cassiers, G., Fouque, P.-A., et al.
(2019). maskverif: Automated verification of higher-
order masking in presence of physical defaults. In Eu-
ropean Symposium on Research in Computer Security,
pages 300–318. Springer.
Barthe, G., Belaïd, S., Dupressoir, F., Fouque, P.-A., et al.
(2015). Verified proofs of higher-order masking.
In Annual International Conference on the Theory
and Applications of Cryptographic Techniques, pages
457–485. Springer.
Barthe, G., Belaïd, S., Fouque, P.-A., and Grégoire, B.
(2018). maskverif: automated analysis of software
and hardware higher-order masked implementations.
Technical report, 562.
Battistello, A., Coron, J.-S., Prouff, E., and Zeitoun, R.
(2016). Horizontal side-channel attacks and coun-
termeasures on the isw masking scheme. In Crypto-
graphic Hardware and Embedded System, pages 23–
39. Springer.
Belaïd, S., Benhamouda, F., Passelègue, A., Prouff, E., et al.
(2016). Randomness complexity of private circuits
for multiplication. In International Conference on
the Theory and Applications of Cryptographic Tech-
niques, pages 616–648. Springer.
Belaïd, S., Mercadier, D., Rivain, M., and Taleb, A. R.
(2022). Ironmask: Versatile verification of masking
security. In IEEE Symposium on Security and Privacy,
pages 142–160. IEEE.
Ben El Ouahma, I., Meunier, Q. L., Heydemann, K., and
Encrenaz, E. (2019). Side-channel robustness analy-
sis of masked assembly codes using a symbolic ap-
proach. Journal of Cryptographic Engineering, pages
231–242.
Bordes, N. and Karpman, P. (2021). Fast verification of
masking schemes in characteristic two. In Interna-
tional Conference on the Theory and Applications of
Cryptographic Techniques, pages 283–312. Springer.
Cassiers, G. and Standaert, F.-X. (2020). Trivially and effi-
ciently composing masked gadgets with probe isolat-
ing non-interference. IEEE Transactions on Informa-
tion Forensics and Security, pages 2542–2555.
De Cnudde, T., Reparaz, O., Bilgin, B., Nikova, S., et al.
(2016). Masking aes with shares in hardware. In Cryp-
tographic Hardware and Embedded Systems, pages
194–212. Springer.
Gao, P., Zhang, J., Song, F., and Wang, C. (2019). Verify-
ing and quantifying side-channel resistance of masked
software implementations. ACM Transactions on Soft-
ware Engineering and Methodology, pages 1–32.
Groß, H., Mangard, S., and Korak, T. (2017). An effi-
cient side-channel protected aes implementation with
arbitrary protection order. In Topics in Cryptology–
CT-RSA 2017: The Cryptographers’ Track at the RSA
Conference, pages 95–112. Springer.
Ishai, Y., Sahai, A., and Wagner, D. (2003). Private circuits:
Securing hardware against probing attacks. In Annual
International Cryptology Conference, pages 463–481.
Springer.
Knichel, D., Sasdrich, P., and Moradi, A. (2020). Silver–
statistical independence and leakage verification. In
International Conference on the Theory and Appli-
cation of Cryptology and Information Security, pages
787–816. Springer.
Kocher, P., Jaffe, J., and Jun, B. (1999). Differential power
analysis. In Annual international cryptology confer-
ence, pages 388–397. Springer.
Mangard, S., Oswald, E., and Popp, T. (2008). Power anal-
ysis attacks: Revealing the secrets of smart cards.
Springer Science & Business Media.
Meunier, Q. L., Pons, E., and Heydemann, K. (2023). Leak-
ageverif: Scalable and efficient leakage verification in
symbolic expressions. IEEE Transactions on Software
Engineering.
Nikova, S., Rechberger, C., and Rijmen, V. (2006). Thresh-
old implementations against side-channel attacks and
glitches. In International conference on informa-
tion and communications security, pages 529–545.
Springer.
Reparaz, O., Bilgin, B., Nikova, S., Gierlichs, B., and Ver-
bauwhede, I. (2015). Consolidating masking schemes.
In Annual Cryptology Conference, pages 764–783.
Springer.
Trichina, E. (2003). Combinational logic design for aes
subbyte transformation on masked data. Cryptology
EPrint Archive.
Wang, W., Ji, F., Zhang, J., and Yu, Y. (2023). Efficient pri-
vate circuits with precomputation. IACR Transactions
on Cryptographic Hardware and Embedded Systems,
pages 286–309.
VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations
527