Leakage-Resilient Symmetric Encryption via Re-keying

被引:0
|
作者
Abdalla, Michel [1 ]
Belaid, Sonia [1 ,2 ]
Fouque, Pierre-Alain [1 ]
机构
[1] Ecole Normale Super, 45 Rue Ulm, F-75005 Paris, France
[2] Thales Commun & Secur, 4 Ave Louvresses, F-92230 Gennevilliers, France
关键词
leakage-resilience; symmetric encryption; re-keying; synchronization; POWER ANALYSIS; SIDE-CHANNEL; SECURITY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the paper, we study whether it is possible to construct an efficient leakage-resilient symmetric scheme using the AES block cipher. We aim at bridging the gap between the theoretical leakage-resilient symmetric primitives used to build encryption schemes and the practical schemes that do not have any security proof against side-channel adversaries. Our goal is to construct an as efficient as possible leakageresilient encryption scheme, but we do not want to change the cryptographic schemes already implemented. The basic idea consists in adding a leakage-resilient re-keying scheme on top of the encryption scheme and has been already suggested by Kocher to thwart differential power analysis techniques. Indeed, in such analysis, the adversary queries the encryption box and from the knowledge of the plaintext/ciphertext, she can perform a divide-and-conquer key recovery attack. The method consisting in changing the key for each or after a small number of encryption with the same key is known as re-keying. It prevents DPA adversaries but not SPA attacks which uses one single leakage trace. Here, we prove that using a leakage-resilient re-keying scheme on top of a secure encryption scheme in the standard model, leads to a leakage-resilient encryption scheme. The main advantage of the AES block cipher is that its implementations are generally heuristically-secure against SPA adversaries. This assumption is used in many concrete instantiations of leakage-resilient symmetric primitives. Consequently, if we use it and change the key for each new message block, the adversary will not be able to recover any key if the re-keying scheme is leakage-resilient. There is mainly two different techniques for re-keying scheme, either parallel or sequential, but if we want to avoid the adversary having access to many inputs/outputs, only the sequential method is possible. However, the main drawback of the latter technique is that in case of de-synchronization, many useless computations are required. In our re-keying scheme, we use ideas from the skip-list data structure to efficiently recover a specific key.
引用
收藏
页码:471 / 488
页数:18
相关论文
共 50 条
  • [1] RCB: leakage-resilient authenticated encryption via re-keying
    Megha Agrawal
    Tarun Kumar Bansal
    Donghoon Chang
    Amit Kumar Chauhan
    Seokhie Hong
    Jinkeon Kang
    Somitra Kumar Sanadhya
    The Journal of Supercomputing, 2018, 74 : 4173 - 4198
  • [2] RCB: leakage-resilient authenticated encryption via re-keying
    Agrawal, Megha
    Bansal, Tarun Kumar
    Chang, Donghoon
    Chauhan, Amit Kumar
    Hong, Seokhie
    Kang, Jinkeon
    Sanadhya, Somitra Kumar
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4173 - 4198
  • [3] Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis
    Belaid, Sonia
    De Santis, Fabrizio
    Heyszl, Johann
    Mangard, Stefan
    Medwed, Marcel
    Schmidt, Jorn-Marc
    Standaert, Francois-Xavier
    Tillich, Stefan
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2014, 4 (03) : 157 - 171
  • [4] Memory leakage-resilient searchable symmetric encryption
    Dai, Shuguang
    Li, Huige
    Zhang, Fangguo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 76 - 84
  • [5] Leakage-Resilient Functional Encryption via Pair Encodings
    Yu, Zuoxia
    Au, Man Ho
    Xu, Qiuliang
    Yang, Rupeng
    Han, Jinguang
    INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 443 - 460
  • [6] Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives
    Pereira, Olivier
    Standaert, Francois-Xavier
    Vivek, Srinivas
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 96 - 108
  • [7] Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
    Kraemer, Juliane
    Struck, Patrick
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 315 - 337
  • [8] Efficient re-keying protocols for multicast encryption
    Di Crescenzo, G
    Kornievskaia, O
    SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 119 - 132
  • [9] Practical Leakage-Resilient Symmetric Cryptography
    Faust, Sebastian
    Pietrzak, Krzysztof
    Schipper, Joachim
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 213 - 232
  • [10] Constructing Committing and Leakage-Resilient Authenticated Encryption
    Struck, Patrick
    Weishaeupl, Maximiliane
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 497 - 528