Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks

被引:0
|
作者
Dodis, Yevgeniy [1 ,2 ]
Pietrzak, Krzysztof [1 ,2 ]
机构
[1] NYU, New York, NY 10003 USA
[2] CWI, Amsterdam, Netherlands
来源
基金
美国国家科学基金会;
关键词
PRIVATE CIRCUITS; CRYPTOSYSTEMS; CRYPTOGRAPHY; CONSTRUCT; SCHEMES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A cryptographic primitive is leakage-resilient, if it remains secure even if an adversary can learn a bounded amount of arbitrary information about the computation with every invocation. As a consequence, the physical implementation of a leakage-resilient primitive is secure against every side-channel as long as the amount of information leaked per invocation is bounded. In this paper we prove positive and negative results about the feasibility of constructing leakage-resilient pseudorandom functions and permutations (i.e. block-ciphers). Our results are three fold: 1. We construct (from any standard PRF) a PRF which satisfies a relaxed notion of leakage-resilience where (1) the leakage function is fixed (and not adaptively chosen with each query.) and (2) the computation is split into several steps which leak individually (a "step" will be the invocation of the underlying PRF.) 2. We prove that a Feistel network with a super-logarithmic number of rounds, each instantiated with a leakage-resilient PRF, is a leakage resilient PRP. This reduction also holds for the non-adaptive notion just discussed, we thus get a block-cipher which is leakage-resilient (against non-adaptive leakage). 3. We propose generic side-channel attacks against Feistel networks. The attacks are generic in the sense that they work for any round functions (e.g. uniformly random functions) and only require some simple leakage from the inputs to the round functions. For example we show how to invert an T round Feistel network over 271 bits making 4.(n+1)(r-2) forward queries, if with each query we are also given as leakage the Hamming weight of the inputs to the r round functions. This complements the result from the previous item showing that a super-constant number of rounds is necessary.
引用
收藏
页码:21 / +
页数:4
相关论文
共 50 条
  • [21] Side-channel attacks on smartcards
    NGS Software
    Netw. Secur., 2006, 12 (18-20):
  • [22] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [23] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [24] Physical functions: the common factor of side-channel and fault attacks?
    Robisson, Bruno
    Le Bouder, Helene
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2016, 6 (03) : 217 - 227
  • [25] Physical Side-Channel Attacks on Embedded Neural Networks: A Survey
    Real, Maria Mendez
    Salvador, Ruben
    APPLIED SCIENCES-BASEL, 2021, 11 (15):
  • [26] Regular lossy functions and their applications in leakage-resilient cryptography
    Chen, Yu
    Qin, Baodong
    Xue, Haiyang
    THEORETICAL COMPUTER SCIENCE, 2018, 739 : 13 - 38
  • [27] Introduction to Side-Channel Attacks and Fault Attacks
    Li, Yang
    Chen, Mengting
    Wang, Jian
    2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2016, : 573 - 575
  • [28] A Hybrid Signcryption Scheme with Leakage-resilience Resistant to Side-channel Attacks
    Tseng, Yuh-Min
    Ho, Ting-Chieh
    Huang, Sen-Shan
    Tsai, Tung-Tso
    2024 8TH INTERNATIONAL CONFERENCE ON IMAGING, SIGNAL PROCESSING AND COMMUNICATIONS, ICISPC 2024, 2024, : 148 - 155
  • [29] Testing Cache Side-channel Leakage
    Basu, Tiyash
    Chattopadhyay, Sudipta
    10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS - ICSTW 2017, 2017, : 51 - 60
  • [30] A Survey of Side-Channel Leakage Assessment
    Wang, Yaru
    Tang, Ming
    ELECTRONICS, 2023, 12 (16)