Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs

被引:0
|
作者
Medwed, Marcel [1 ]
Standaert, Francois-Xavier [1 ,4 ]
Joux, Antoine [2 ,3 ]
机构
[1] Catholic Univ Louvain, UCL Crypto Grp, Pl Levant 3, B-1348 Louvain La Neuve, Belgium
[2] DGA, F-78035 Versailles, France
[3] Univ Versailles St Quentin En Yvelines, Lab PRISM, F-78035 Versailles, France
[4] Belgian Fund Sci Res FNRS FRS, Louvain, Belgium
基金
欧洲研究理事会;
关键词
PRIVATE CIRCUITS; CRYPTOGRAPHY; ATTACKS; POWER;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Leakage-resilient constructions have attracted significant attention over the last couple of years. In practice, pseudorandom functions are among the most important such primitives, because they are stateless and do not require a secure initialization as, e.g. stream ciphers. However, their deployment in actual applications is still limited by security and efficiency concerns. This paper contributes to solve these issues in two directions. On the one hand, we highlight that the condition of bounded data complexity, that is guaranteed by previous leakage-resilient constructions, may not be enough to obtain practical security. We show experimentally that, if implemented in an 8-bit microcontroller, such constructions can actually be broken. On the other hand, we present tweaks for tree-based leakage-resilient PRFs that improve their efficiency and their security, by taking advantage of parallel implementations. Our security analyses are based on worst-case attacks in a noise-free setting and suggest that under reasonable assumptions, the side-channel resistance of our construction grows super-exponentially with a security parameter that corresponds to the degree of parallelism of the implementation. In addition, it exhibits that standard DPA attacks are not the most relevant tool for evaluating such leakage-resilient constructions and may lead to overestimated security. As a consequence, we investigate more sophisticated tools based on lattice reduction, which turn out to be powerful in the physical cryptanalysis of these primitives. Eventually, we put forward that the AES is not perfectly suited for integration in a leakage-resilient design. This observation raises interesting challenges for developing block ciphers with better properties regarding leakage-resilience.
引用
收藏
页码:193 / 212
页数:20
相关论文
共 27 条
  • [21] Octal: Efficient Automatic Data-Oblivious Program Transformations to Eliminate Side-Channel Leakage
    Tiruye, Biniyam
    Biernacki, Lauren
    Adem, Tersiteab
    Mola, Petros
    Austin, Todd
    2024 IEEE SECURE DEVELOPMENT CONFERENCE, SECDEV 2024, 2024, : 129 - 139
  • [22] GE vs GM: Efficient side-channel security evaluations on full cryptographic keys
    Rădulescu A.
    Popescu P.G.
    Choudary M.O.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 886 - 905
  • [23] Towards Generic Power/EM Side-Channel Attacks: Memory Leakage on General-Purpose Computers
    Aknesil, Can
    Dubrova, Elena
    PROCEEDINGS OF THE 2022 IFIP/IEEE 30TH INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2022,
  • [24] Towards Efficient Traffic Monitoring for Science DMZ with Side-Channel based Traffic Winnowing
    Li, Hongda
    Zhang, Fuqiang
    Yu, Lu
    Oakley, Jon
    Hu, Hongxin
    Brooks, Richard R.
    PROCEEDINGS OF THE 2018 ACM INTERNATIONAL WORKSHOP ON SECURITY IN SOFTWARE DEFINED NETWORKS & NETWORK FUNCTION VIRTUALIZATION (SDN-NFVSEC'18), 2018, : 55 - 58
  • [25] Formal Security Proofs via Doeblin Coefficients: Optimal Side-Channel Factorization from Noisy Leakage to Random Probing
    Beguinot, Julien
    Cheng, Wei
    Guilley, Sylvain
    Rioul, Olivier
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT VI, 2024, 14925 : 389 - 426
  • [26] Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations Towards Analytical Attacks against 32-bit Implementations
    Cassiers G.
    Devillez H.
    Standaert F.-X.
    Udvarhelyi B.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (03): : 270 - 293
  • [27] Efficient and Side-Channel Resistant Design of High-Security Ed448 on ARM Cortex-M4
    Anastasova, Mila
    Bisheh-Niasar, Mojtaba
    Seo, Hwajeong
    Azarderakhsh, Reza
    Kermani, Mehran Mozaffari
    2022 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2022, : 93 - 96