Algorithmic Tamper-Proof Security under Probing Attacks

被引:0
作者
Liu, Feng-Hao [1 ]
Lysyanskaya, Anna [1 ]
机构
[1] Brown Univ, Dept Comp, Providence, RI 02912 USA
来源
SECURITY AND CRYPTOGRAPHY FOR NETWORKS | 2010年 / 6280卷
关键词
PRIVATE CIRCUITS; HARDWARE;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Gennaro et al. initiated the study of algorithmic tamper proof (ATP) cryptography: cryptographic hardware that remains secure even in the presence of an adversary who can tamper with the memory content of a hardware device. In this paper, we solve an open problem stated in their paper, and also consider whether a device can be secured against an adversary who can both tamper with its memory and probe a few memory locations or wires at a time. Our results are as follows: It is impossible to realize a secure cryptographic functionality with a personal identification number (PIN) where a user is allowed to make up to incorrect consecutive attempts to enter her PIN, with no total limit on incorrect PIN attempts. (This was left as an open problem by Gennaro et al.) It is impossible to secure a deterministic cryptographic device against an adversary who is allowed to both tamper with the memory of the device and probe a memory location; it is also essentially infeasible to secure it if the adversary's probing power is restricted to internal wires; it is impossible to secure it against an adversary whose probing power is restricted to internal wires, but who is also allowed to tamper with a few internal wires. By extending the results of Ishai et al., we show that a cryptographic device with a true source of randomness can withstand tampering and limited probing attacks at the same time.
引用
收藏
页码:106 / 120
页数:15
相关论文
共 14 条
  • [1] Agrawal D, 2002, LECT NOTES COMPUT SC, V2523, P29
  • [2] Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
  • [3] Anderson R., 1997, LNCS, V1189
  • [4] [Anonymous], ICS
  • [5] Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
  • [6] Biham E, 1997, LECT NOTES COMPUT SC, V1294, P513
  • [7] Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
  • [8] Gennaro R, 2004, LECT NOTES COMPUT SC, V2951, P258
  • [9] Private circuits: Securing hardware against probing attacks
    Ishai, Y
    Sahai, A
    Wagner, D
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 463 - 481
  • [10] Ishai Y, 2006, LECT NOTES COMPUT SC, V4004, P308