On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages

被引:1
|
作者
De Santis, Fabrizio [1 ]
Rass, Stefan [2 ]
机构
[1] Tech Univ Munich, D-80290 Munich, Germany
[2] Alpen Adria Univ, Klagenfurt, Austria
来源
关键词
SIDE-CHANNEL; POWER ANALYSIS; SECURITY; CRYPTOGRAPHY; ATTACKS;
D O I
10.1007/978-3-319-16295-9_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel attacks have grown into a central threat to the security of nowadays cryptographic devices. The set of implementation countermeasures constantly competes with the set of known attack strategies, however, systematic ways to protect against information leakage are uncommon. Despite many achievements in the field of secure implementations, side-channel countermeasures only offer ad-hoc remedies which do not conform to the idea of provably secure cryptosystems. On the other side, leakage-resilient constructions often hinge on assumptions which can be hardly translated into practice. This work is an attempt to provide a theoretical, yet practical, modeling of side-channels that aids in identifying spots and making design choices towards a comprehensive side-channel security treatment from theoretical proofs down to hardware implementations. More precisely, we illustrate a simple sufficient condition for building physically secure hardware that follows directly from the decomposition of the side-channel into an algorithmic-related part and a physical-related part, and hardness of inversion. We put forward that our simple modeling allows to commit clear security goals to cryptographers and hardware designers and preserve the security of theoretical constructions all the way down to final chip fabrication. As a showcase application, we consider the security of the Goldwasser-Goldreich-Micali (GGM) construction scheme for efficient pseudorandom functions with and without leakages. These security proofs have been left open in previous literature and here serve to demonstrate the feasibility of our modeling approach.
引用
收藏
页码:127 / 145
页数:19
相关论文
共 27 条
  • [1] Functional Encryption Resilient to Hard-to-Invert Leakage
    Zhang, Mingwu
    Wang, Chunzhi
    Takagi, Tsuyoshi
    Mu, Yi
    [J]. COMPUTER JOURNAL, 2015, 58 (04): : 735 - 749
  • [2] Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
    Kraemer, Juliane
    Struck, Patrick
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 315 - 337
  • [3] Practical Leakage-Resilient Pseudorandom Generators
    Yu, Yu
    Standaert, Francois-Xavier
    Pereira, Olivier
    Yung, Moti
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 141 - 151
  • [4] Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions
    Ishizaka, Masahito
    Matsuura, Kanta
    [J]. INFORMATION SECURITY (ISC 2018), 2018, 11060 : 422 - 441
  • [5] Signature Schemes Secure Against Hard-to-Invert Leakage
    Faust, Sebastian
    Hazay, Carmit
    Nielsen, Jesper Buus
    Zottarel, Angela
    Nordholt, Peter Sebastian
    [J]. JOURNAL OF CRYPTOLOGY, 2016, 29 (02) : 422 - 455
  • [6] Signature Schemes Secure Against Hard-to-Invert Leakage
    Sebastian Faust
    Carmit Hazay
    Jesper Buus Nielsen
    Peter Sebastian Nordholt
    Angela Zottarel
    [J]. Journal of Cryptology, 2016, 29 : 422 - 455
  • [7] Signature Schemes Secure against Hard-to-Invert Leakage
    Faust, Sebastian
    Hazay, Carmit
    Nielsen, Jesper Buus
    Nordholt, Peter Sebastian
    Zottarel, Angela
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012, 2012, 7658 : 98 - 115
  • [8] Continuous hard-to-invert functions and biometric authentication
    Grigoriev, Dima
    Nikolenko, Sergey
    [J]. GROUPS COMPLEXITY CRYPTOLOGY, 2012, 4 (01) : 19 - 32
  • [9] Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
    Dodis, Yevgeniy
    Pietrzak, Krzysztof
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 21 - +
  • [10] Regular lossy functions and their applications in leakage-resilient cryptography
    Chen, Yu
    Qin, Baodong
    Xue, Haiyang
    [J]. THEORETICAL COMPUTER SCIENCE, 2018, 739 : 13 - 38