Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks

被引:0
|
作者
Dodis, Yevgeniy [1 ,2 ]
Pietrzak, Krzysztof [1 ,2 ]
机构
[1] NYU, New York, NY 10003 USA
[2] CWI, Amsterdam, Netherlands
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2010 | 2010年 / 6223卷
基金
美国国家科学基金会;
关键词
PRIVATE CIRCUITS; CRYPTOSYSTEMS; CRYPTOGRAPHY; CONSTRUCT; SCHEMES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A cryptographic primitive is leakage-resilient, if it remains secure even if an adversary can learn a bounded amount of arbitrary information about the computation with every invocation. As a consequence, the physical implementation of a leakage-resilient primitive is secure against every side-channel as long as the amount of information leaked per invocation is bounded. In this paper we prove positive and negative results about the feasibility of constructing leakage-resilient pseudorandom functions and permutations (i.e. block-ciphers). Our results are three fold: 1. We construct (from any standard PRF) a PRF which satisfies a relaxed notion of leakage-resilience where (1) the leakage function is fixed (and not adaptively chosen with each query.) and (2) the computation is split into several steps which leak individually (a "step" will be the invocation of the underlying PRF.) 2. We prove that a Feistel network with a super-logarithmic number of rounds, each instantiated with a leakage-resilient PRF, is a leakage resilient PRP. This reduction also holds for the non-adaptive notion just discussed, we thus get a block-cipher which is leakage-resilient (against non-adaptive leakage). 3. We propose generic side-channel attacks against Feistel networks. The attacks are generic in the sense that they work for any round functions (e.g. uniformly random functions) and only require some simple leakage from the inputs to the round functions. For example we show how to invert an T round Feistel network over 271 bits making 4.(n+1)(r-2) forward queries, if with each query we are also given as leakage the Hamming weight of the inputs to the r round functions. This complements the result from the previous item showing that a super-constant number of rounds is necessary.
引用
收藏
页码:21 / +
页数:4
相关论文
共 50 条
  • [21] Compositional Verification of Efficient Masking Countermeasures against Side-Channel Attacks
    Gao, Pengfei
    Zhang, Yedi
    Song, Fu
    Chen, Taolue
    Standaert, Francois-Xavier
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2023, 7 (OOPSLA):
  • [22] Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture
    Alahmadi, Adel N.
    Rehman, Saeed Ur
    Alhazmi, Husain S.
    Glynn, David G.
    Shoaib, Hatoon
    Sole, Patrick
    SENSORS, 2022, 22 (09)
  • [23] Hardware Security: Physical Design versus Side-channel and Fault Attacks
    Verbauwhede, Ingrid
    ISPD'22: PROCEEDINGS OF THE 2022 INTERNATIONAL SYMPOSIUM ON PHYSICAL DESIGN, 2022, : 219 - 219
  • [24] WHISPER: A Tool for Run-Time Detection of Side-Channel Attacks
    Mushtaq, Maria
    Bricq, Jeremy
    Bhatti, Muhammad Khurram
    Akram, Ayaz
    Lapotre, Vianney
    Gogniat, Guy
    Benoit, Pascal
    IEEE ACCESS, 2020, 8 : 83871 - 83900
  • [25] Neural Networks as a Side-Channel Countermeasure: Challenges and Opportunities
    Krautter, Jonas
    Tahoori, Mehdi B.
    2021 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2021), 2021, : 272 - 277
  • [26] NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage
    Bhasin, Shivam
    Danger, Jean-Luc
    Guilley, Sylvain
    Najm, Zakaria
    2014 INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY, TOKYO (EMC'14/TOKYO), 2014, : 310 - 313
  • [27] Protecting Cryptographic Libraries Against Side-Channel and Code-Reuse Attacks
    Tsoupidi, Rodothea Myrsini
    Troubitsyna, Elena
    Papadimitratos, Panos
    IEEE SECURITY & PRIVACY, 2024, : 2 - 11
  • [28] A Hardware-Friendly Shuffling Countermeasure Against Side-Channel Attacks for Kyber
    Xu, Dejun
    Wang, Kai
    Tian, Jing
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2025, 72 (03) : 504 - 508
  • [29] Feature Selection Methods for Non-Profiled Side-Channel Attacks on ECC
    Ravi, Prasanna
    Jungk, Bernhard
    Jap, Dirmanto
    Najm, Zakaria
    Bhasin, Shivam
    2018 IEEE 23RD INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2018,
  • [30] Side-channel attacks in ECC: A general technique for varying the parametrization of the elliptic curve
    Olson, LD
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 220 - 229