Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks

被引:0
|
作者
Dodis, Yevgeniy [1 ,2 ]
Pietrzak, Krzysztof [1 ,2 ]
机构
[1] NYU, New York, NY 10003 USA
[2] CWI, Amsterdam, Netherlands
来源
基金
美国国家科学基金会;
关键词
PRIVATE CIRCUITS; CRYPTOSYSTEMS; CRYPTOGRAPHY; CONSTRUCT; SCHEMES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A cryptographic primitive is leakage-resilient, if it remains secure even if an adversary can learn a bounded amount of arbitrary information about the computation with every invocation. As a consequence, the physical implementation of a leakage-resilient primitive is secure against every side-channel as long as the amount of information leaked per invocation is bounded. In this paper we prove positive and negative results about the feasibility of constructing leakage-resilient pseudorandom functions and permutations (i.e. block-ciphers). Our results are three fold: 1. We construct (from any standard PRF) a PRF which satisfies a relaxed notion of leakage-resilience where (1) the leakage function is fixed (and not adaptively chosen with each query.) and (2) the computation is split into several steps which leak individually (a "step" will be the invocation of the underlying PRF.) 2. We prove that a Feistel network with a super-logarithmic number of rounds, each instantiated with a leakage-resilient PRF, is a leakage resilient PRP. This reduction also holds for the non-adaptive notion just discussed, we thus get a block-cipher which is leakage-resilient (against non-adaptive leakage). 3. We propose generic side-channel attacks against Feistel networks. The attacks are generic in the sense that they work for any round functions (e.g. uniformly random functions) and only require some simple leakage from the inputs to the round functions. For example we show how to invert an T round Feistel network over 271 bits making 4.(n+1)(r-2) forward queries, if with each query we are also given as leakage the Hamming weight of the inputs to the r round functions. This complements the result from the previous item showing that a super-constant number of rounds is necessary.
引用
收藏
页码:21 / +
页数:4
相关论文
共 50 条
  • [1] Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption
    Unterluggauer, Thomas
    Werner, Mario
    Mangard, Stefan
    [J]. PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 1318 - 1323
  • [2] Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Tsai, Tung-Tso
    [J]. IEEE ACCESS, 2019, 7 : 19041 - 19053
  • [3] Leakage-Resilient Anonymous Multireceiver Certificateless Encryption Resistant to Side-Channel Attacks
    Xie, Jia-Yi
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2674 - 2685
  • [4] Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
    Kraemer, Juliane
    Struck, Patrick
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 315 - 337
  • [5] A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks
    Hsieh, Tsung-Che
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. IEEE ACCESS, 2020, 8 : 121795 - 121810
  • [6] Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
    Medwed, Marcel
    Standaert, Francois-Xavier
    Joux, Antoine
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 193 - 212
  • [7] Practical Leakage-Resilient Pseudorandom Generators
    Yu, Yu
    Standaert, Francois-Xavier
    Pereira, Olivier
    Yung, Moti
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 141 - 151
  • [8] On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages
    De Santis, Fabrizio
    Rass, Stefan
    [J]. PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014, 2015, 8895 : 127 - 145
  • [9] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    [J]. 39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [10] Exploiting the microarchitectural leakage of prefetching activities for side-channel attacks
    Xiao, Chong
    Tang, Ming
    Guilley, Sylvain
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 139