Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs

被引:0
|
作者
Medwed, Marcel [1 ]
Standaert, Francois-Xavier [1 ,4 ]
Joux, Antoine [2 ,3 ]
机构
[1] Catholic Univ Louvain, UCL Crypto Grp, Pl Levant 3, B-1348 Louvain La Neuve, Belgium
[2] DGA, F-78035 Versailles, France
[3] Univ Versailles St Quentin En Yvelines, Lab PRISM, F-78035 Versailles, France
[4] Belgian Fund Sci Res FNRS FRS, Louvain, Belgium
基金
欧洲研究理事会;
关键词
PRIVATE CIRCUITS; CRYPTOGRAPHY; ATTACKS; POWER;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Leakage-resilient constructions have attracted significant attention over the last couple of years. In practice, pseudorandom functions are among the most important such primitives, because they are stateless and do not require a secure initialization as, e.g. stream ciphers. However, their deployment in actual applications is still limited by security and efficiency concerns. This paper contributes to solve these issues in two directions. On the one hand, we highlight that the condition of bounded data complexity, that is guaranteed by previous leakage-resilient constructions, may not be enough to obtain practical security. We show experimentally that, if implemented in an 8-bit microcontroller, such constructions can actually be broken. On the other hand, we present tweaks for tree-based leakage-resilient PRFs that improve their efficiency and their security, by taking advantage of parallel implementations. Our security analyses are based on worst-case attacks in a noise-free setting and suggest that under reasonable assumptions, the side-channel resistance of our construction grows super-exponentially with a security parameter that corresponds to the degree of parallelism of the implementation. In addition, it exhibits that standard DPA attacks are not the most relevant tool for evaluating such leakage-resilient constructions and may lead to overestimated security. As a consequence, we investigate more sophisticated tools based on lattice reduction, which turn out to be powerful in the physical cryptanalysis of these primitives. Eventually, we put forward that the AES is not perfectly suited for integration in a leakage-resilient design. This observation raises interesting challenges for developing block ciphers with better properties regarding leakage-resilience.
引用
收藏
页码:193 / 212
页数:20
相关论文
共 27 条
  • [11] System Side-Channel Leakage Emulation for HW/SW Security Coverification of MPSoCs
    Krieg, Armin
    Grinschgl, Johannes
    Steger, Christian
    Weiss, Reinhold
    Bock, Holger
    Haid, Josef
    2012 IEEE 15TH INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS & SYSTEMS (DDECS), 2012, : 139 - 144
  • [12] Towards efficient and automated side-channel evaluations at design time
    Danilo Šijačić
    Josep Balasch
    Bohan Yang
    Santosh Ghosh
    Ingrid Verbauwhede
    Journal of Cryptographic Engineering, 2020, 10 : 305 - 319
  • [13] Towards efficient and automated side-channel evaluations at design time
    Sijacic, Danilo
    Balasch, Josep
    Yang, Bohan
    Ghosh, Santosh
    Verbauwhede, Ingrid
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (04) : 305 - 319
  • [14] Towards security limits in side-channel attacks (with an application to block ciphers)
    Standaert, F. -X.
    Peeters, E.
    Archambeau, C.
    Quisquater, J. -J.
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 30 - 45
  • [15] Holistic Power Side-Channel Leakage Assessment: Towards a Robust Multidimensional Metric
    Althoff, Alric
    Blackstone, Jeremy
    Kastner, Ryan
    2019 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2019,
  • [16] Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
    Glowacz, Cezary
    Grosso, Vincent
    Poussier, Romain
    Schueth, Joachim
    Standaert, Francois-Xavier
    FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 117 - 129
  • [17] An efficient and leakage-resilient RSA-based authenticated key exchange protocol with tight security reduction
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (02) : 474 - 490
  • [18] Towards Quantum-Resistant Security: Pre-Silicon Power Side-Channel Leakage Analysis of CRYSTALS-Kyber
    Alam, Nashmin
    Zhang, Tao
    Farahmandi, Farimah
    2024 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, ISVLSI, 2024, : 149 - 154
  • [19] Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts
    Wang, Zilong
    Mohr, Gideon
    von Gleissenthall, Klaus
    Reineke, Jan
    Guarnieri, Marco
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 2128 - 2142
  • [20] Poster: When Adversary Becomes the Guardian - Towards Side-channel Security With Adversarial Attacks
    Picek, Stjepan
    Jap, Dirmanto
    Bhasin, Shivam
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 2673 - 2675