Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs

被引:0
|
作者
Medwed, Marcel [1 ]
Standaert, Francois-Xavier [1 ,4 ]
Joux, Antoine [2 ,3 ]
机构
[1] Catholic Univ Louvain, UCL Crypto Grp, Pl Levant 3, B-1348 Louvain La Neuve, Belgium
[2] DGA, F-78035 Versailles, France
[3] Univ Versailles St Quentin En Yvelines, Lab PRISM, F-78035 Versailles, France
[4] Belgian Fund Sci Res FNRS FRS, Louvain, Belgium
来源
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012 | 2012年 / 7428卷
基金
欧洲研究理事会;
关键词
PRIVATE CIRCUITS; CRYPTOGRAPHY; ATTACKS; POWER;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Leakage-resilient constructions have attracted significant attention over the last couple of years. In practice, pseudorandom functions are among the most important such primitives, because they are stateless and do not require a secure initialization as, e.g. stream ciphers. However, their deployment in actual applications is still limited by security and efficiency concerns. This paper contributes to solve these issues in two directions. On the one hand, we highlight that the condition of bounded data complexity, that is guaranteed by previous leakage-resilient constructions, may not be enough to obtain practical security. We show experimentally that, if implemented in an 8-bit microcontroller, such constructions can actually be broken. On the other hand, we present tweaks for tree-based leakage-resilient PRFs that improve their efficiency and their security, by taking advantage of parallel implementations. Our security analyses are based on worst-case attacks in a noise-free setting and suggest that under reasonable assumptions, the side-channel resistance of our construction grows super-exponentially with a security parameter that corresponds to the degree of parallelism of the implementation. In addition, it exhibits that standard DPA attacks are not the most relevant tool for evaluating such leakage-resilient constructions and may lead to overestimated security. As a consequence, we investigate more sophisticated tools based on lattice reduction, which turn out to be powerful in the physical cryptanalysis of these primitives. Eventually, we put forward that the AES is not perfectly suited for integration in a leakage-resilient design. This observation raises interesting challenges for developing block ciphers with better properties regarding leakage-resilience.
引用
收藏
页码:193 / 212
页数:20
相关论文
共 4 条
  • [1] Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
    Dodis, Yevgeniy
    Pietrzak, Krzysztof
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 21 - +
  • [2] Leakage-Resilient Anonymous Multireceiver Certificateless Encryption Resistant to Side-Channel Attacks
    Xie, Jia-Yi
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2674 - 2685
  • [3] A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks
    Hsieh, Tsung-Che
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE ACCESS, 2020, 8 (08): : 121795 - 121810
  • [4] Formal Security Proofs via Doeblin Coefficients: Optimal Side-Channel Factorization from Noisy Leakage to Random Probing
    Beguinot, Julien
    Cheng, Wei
    Guilley, Sylvain
    Rioul, Olivier
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT VI, 2024, 14925 : 389 - 426