Practical Leakage-Resilient Pseudorandom Generators

被引:40
|
作者
Yu, Yu [1 ]
Standaert, Francois-Xavier [1 ]
Pereira, Olivier [1 ]
Yung, Moti [2 ]
机构
[1] Catholic Univ Louvain, Crypto Grp, B-1348 Louvain, Belgium
[2] Columbia Univ, Google Inc, New York, NY 10027 USA
关键词
CRYPTOGRAPHY;
D O I
10.1145/1866307.1866324
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic functions is a good source of randomness, and for e ffi ciency, the primitive of pseudorandom generator (PRG). PRG can also be used in the design of stream ciphers, for secure communications. The Internet is nowadays composed of many types of devices with very di ff erent hardware and software characteristics. Hence, one of the concerns in such open environments is the information\ leakage" and its exploitation via the so-called\ side channel attacks". A very extensive and current research direction is designing basic cryptographic operations that are resistant to such attacks. Recent works on leakage-resilient PRG and stream ciphers did signi fi cant progresses in providing tools for the analysis of side-channel attacks in the standard cryptographic setting. But in the absence of a completely sound model for the leakages, the only constructions that can be proven secure require tweaks that do not correspond to the physical intuition. For example, constructions using an alternating structure, in which a key bit-size of 2n can only guarantee a security of at most 2 n, have been designed for this purpose. In this paper, we provide two methodological contributions, allowing to get rid of these tweaks, or to reduce their impact towards negligible performance overheads. First, we show that the leakage-resilience of a natural, i. e. conform to engineering experience, stateful PRG can be proven under a random oracle based assumption. We then discuss the relevance of this assumption, and argue that it nicely captures the reality of actual side-channel attacks. Second, we provide the fi rst construction of a PRG without alternating structure, that exploits the keying material to its full length and that can be proven leakage-resilient in the standard model. For this purpose, we only need to assume a non adaptive leakage function and a small public memory. We also argue that such an assumption is not only realistic, but necessary for any leakage-resilient primitive that grants adversaries with a (stateless) reinitialization capability. Together with weaker requirements for practical implementations, these contributions further reduce the gap between the theory and practice of physically observable cryptography.
引用
收藏
页码:141 / 151
页数:11
相关论文
共 50 条
  • [1] Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
    Kraemer, Juliane
    Struck, Patrick
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 315 - 337
  • [2] Practical Leakage-Resilient Symmetric Cryptography
    Faust, Sebastian
    Pietrzak, Krzysztof
    Schipper, Joachim
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 213 - 232
  • [3] On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages
    De Santis, Fabrizio
    Rass, Stefan
    [J]. PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014, 2015, 8895 : 127 - 145
  • [4] Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
    Dodis, Yevgeniy
    Pietrzak, Krzysztof
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 21 - +
  • [5] Leakage-Resilient Storage
    Davi, Francesco
    Dziembowski, Stefan
    Venturi, Daniele
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 121 - +
  • [6] Leakage-Resilient Cryptography
    Dziembowski, Stefan
    Pietrzak, Krzysztof
    [J]. PROCEEDINGS OF THE 49TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2008, : 293 - +
  • [7] Leakage-Resilient Signatures
    Faust, Sebastian
    Kiltz, Eike
    Pietrzak, Krzysztof
    Rothblum, Guy N.
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 : 343 - +
  • [8] Leakage-Resilient Zero Knowledge
    Garg, Sanjam
    Jain, Abhishek
    Sahai, Amit
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 297 - 315
  • [9] Fully Leakage-Resilient Signatures
    Boyle, Elette
    Segev, Gil
    Wichs, Daniel
    [J]. JOURNAL OF CRYPTOLOGY, 2013, 26 (03) : 513 - 558
  • [10] Leakage-resilient coin tossing
    Elette Boyle
    Shafi Goldwasser
    Yael Tauman Kalai
    [J]. Distributed Computing, 2014, 27 : 147 - 164