Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks

被引:0
|
作者
Dodis, Yevgeniy [1 ,2 ]
Pietrzak, Krzysztof [1 ,2 ]
机构
[1] NYU, New York, NY 10003 USA
[2] CWI, Amsterdam, Netherlands
来源
基金
美国国家科学基金会;
关键词
PRIVATE CIRCUITS; CRYPTOSYSTEMS; CRYPTOGRAPHY; CONSTRUCT; SCHEMES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A cryptographic primitive is leakage-resilient, if it remains secure even if an adversary can learn a bounded amount of arbitrary information about the computation with every invocation. As a consequence, the physical implementation of a leakage-resilient primitive is secure against every side-channel as long as the amount of information leaked per invocation is bounded. In this paper we prove positive and negative results about the feasibility of constructing leakage-resilient pseudorandom functions and permutations (i.e. block-ciphers). Our results are three fold: 1. We construct (from any standard PRF) a PRF which satisfies a relaxed notion of leakage-resilience where (1) the leakage function is fixed (and not adaptively chosen with each query.) and (2) the computation is split into several steps which leak individually (a "step" will be the invocation of the underlying PRF.) 2. We prove that a Feistel network with a super-logarithmic number of rounds, each instantiated with a leakage-resilient PRF, is a leakage resilient PRP. This reduction also holds for the non-adaptive notion just discussed, we thus get a block-cipher which is leakage-resilient (against non-adaptive leakage). 3. We propose generic side-channel attacks against Feistel networks. The attacks are generic in the sense that they work for any round functions (e.g. uniformly random functions) and only require some simple leakage from the inputs to the round functions. For example we show how to invert an T round Feistel network over 271 bits making 4.(n+1)(r-2) forward queries, if with each query we are also given as leakage the Hamming weight of the inputs to the r round functions. This complements the result from the previous item showing that a super-constant number of rounds is necessary.
引用
收藏
页码:21 / +
页数:4
相关论文
共 50 条
  • [31] Codes for Side-Channel Attacks and Protections
    Guilley, Sylvain
    Heuser, Annelie
    Rioul, Olivier
    [J]. CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 35 - 55
  • [32] Side-channel leakage tolerant architectures
    Tiri, Kris
    Schaumont, Patrick
    Verbauwhede, Ingrid
    [J]. THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 204 - +
  • [33] Side-Channel Attacks in a Real Scenario
    Ming Tang
    Maixing Luo
    Junfeng Zhou
    Zhen Yang
    Zhipeng Guo
    Fei Yan
    Liang Liu
    [J]. Tsinghua Science and Technology, 2018, 23 (05) : 586 - 598
  • [34] Synthesis of Adaptive Side-Channel Attacks
    Quoc-Sang Phan
    Bang, Lucas
    Pasareanu, Corina S.
    Malacaria, Pasquale
    Bultan, Tevfik
    [J]. 2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 328 - 342
  • [35] Optimal Collision Side-Channel Attacks
    Glowacz, Cezary
    Grosso, Vincent
    [J]. SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 : 126 - 140
  • [36] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [37] Side-Channel Attacks: A Short Tour
    Piessens, Frank
    van Oorschot, Paul C.
    Piessens, Frank
    van Oorshot, Paul C.
    [J]. IEEE SECURITY & PRIVACY, 2024, 22 (02) : 75 - 80
  • [38] Soft Analytical Side-Channel Attacks
    Veyrat-Charvillon, Nicolas
    Gerard, Benoit
    Standaert, Francois-Xavier
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 282 - 296
  • [39] Cache Side-Channel Attacks and Defenses
    Zhang, Weijuan
    Bai, Lu
    Ling, Yuqing
    Lan, Xiao
    Jia, Xiaoqi
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [40] Experimental Investigation of Side-Channel Attacks on Neuromorphic Spiking Neural Networks
    Goswami, Bhanprakash
    Das, Tamoghno
    Suri, Manan
    [J]. IEEE EMBEDDED SYSTEMS LETTERS, 2024, 16 (02) : 231 - 234