Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks

被引:53
作者
Kopf, Boris
Smith, Geoffrey
机构
来源
2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF) | 2010年
关键词
D O I
10.1109/CSF.2010.11
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We establish formal bounds for the number of min-entropy bits that can be extracted in a timing attack against a cryptosystem that is protected by blinding, the state-of-the art countermeasure against timing attacks. Compared with existing bounds, our bounds are both tighter and of greater operational significance, in that they directly address the key's one-guess vulnerability. Moreover, we show that any semantically secure public-key cryptosystem remains semantically secure in the presence of timing attacks, if the implementation is protected by blinding and bucketing. This result shows that, by considering (and justifying) more optimistic models of leakage than recent proposals for leakage-resilient cryptosystems, one can achieve provable resistance against side-channel attacks for standard cryptographic primitives.
引用
收藏
页码:44 / 56
页数:13
相关论文
共 27 条
[1]  
Alwen Joel, LECT NOTES COMPUTER, V5677, P36
[2]  
[Anonymous], 2006, Elements of Information Theory
[3]  
[Anonymous], P 14 ACM C COMP COMM
[4]  
[Anonymous], LECT NOTES COMPUT SC
[5]  
[Anonymous], 2000, P POPL 00
[6]  
Backes M, 2008, LECT NOTES COMPUT SC, V5283, P517
[7]  
Barthe Gilles, 2005, ELECT NOTES THEORETI, P33
[8]   Quantitative Notions of Leakage for One-try Attacks [J].
Braun, Christelle ;
Chatzikokolakis, Konstantinos ;
Palamidessi, Catuscia .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 249 :75-91
[9]   Remote timing attacks are practical [J].
Brumley, D ;
Boneh, D .
COMPUTER NETWORKS, 2005, 48 (05) :701-716
[10]  
Cachin Christian, 1997, Entropy measures and unconditional security in cryptography