Practical Leakage-Resilient Pseudorandom Generators

被引:40
|
作者
Yu, Yu [1 ]
Standaert, Francois-Xavier [1 ]
Pereira, Olivier [1 ]
Yung, Moti [2 ]
机构
[1] Catholic Univ Louvain, Crypto Grp, B-1348 Louvain, Belgium
[2] Columbia Univ, Google Inc, New York, NY 10027 USA
关键词
CRYPTOGRAPHY;
D O I
10.1145/1866307.1866324
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic functions is a good source of randomness, and for e ffi ciency, the primitive of pseudorandom generator (PRG). PRG can also be used in the design of stream ciphers, for secure communications. The Internet is nowadays composed of many types of devices with very di ff erent hardware and software characteristics. Hence, one of the concerns in such open environments is the information\ leakage" and its exploitation via the so-called\ side channel attacks". A very extensive and current research direction is designing basic cryptographic operations that are resistant to such attacks. Recent works on leakage-resilient PRG and stream ciphers did signi fi cant progresses in providing tools for the analysis of side-channel attacks in the standard cryptographic setting. But in the absence of a completely sound model for the leakages, the only constructions that can be proven secure require tweaks that do not correspond to the physical intuition. For example, constructions using an alternating structure, in which a key bit-size of 2n can only guarantee a security of at most 2 n, have been designed for this purpose. In this paper, we provide two methodological contributions, allowing to get rid of these tweaks, or to reduce their impact towards negligible performance overheads. First, we show that the leakage-resilience of a natural, i. e. conform to engineering experience, stateful PRG can be proven under a random oracle based assumption. We then discuss the relevance of this assumption, and argue that it nicely captures the reality of actual side-channel attacks. Second, we provide the fi rst construction of a PRG without alternating structure, that exploits the keying material to its full length and that can be proven leakage-resilient in the standard model. For this purpose, we only need to assume a non adaptive leakage function and a small public memory. We also argue that such an assumption is not only realistic, but necessary for any leakage-resilient primitive that grants adversaries with a (stateless) reinitialization capability. Together with weaker requirements for practical implementations, these contributions further reduce the gap between the theory and practice of physically observable cryptography.
引用
收藏
页码:141 / 151
页数:11
相关论文
共 50 条
  • [21] Limits of a conjecture on a leakage-resilient cryptosystem
    Galindo, David
    Vivek, Srinivas
    [J]. INFORMATION PROCESSING LETTERS, 2014, 114 (04) : 192 - 196
  • [22] Practical continuous leakage-resilient CCA secure identity-based encryption
    Zhou, Yanwei
    Yang, Bo
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2020, 14 (04)
  • [23] New Developments in Leakage-Resilient Cryptography
    Vaikuntanathan, Vinod
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 283 - 283
  • [24] A new construction of leakage-resilient signature
    Wang, Zhiwei
    Zhang, Wei
    [J]. Journal of Computational Information Systems, 2010, 6 (02): : 387 - 394
  • [25] Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
    Chow, Sherman S. M.
    Dodis, Yevgeniy
    Rouselakis, Yannis
    Waters, Brent
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 152 - 161
  • [26] Practical continuous leakage-resilient CCA secure identity-based encryption
    Yanwei Zhou
    Bo Yang
    [J]. Frontiers of Computer Science, 2020, 14
  • [27] Leakage-resilient ring signature schemes
    Huang, Jianye
    Huang, Qiong
    Susilo, Willy
    [J]. THEORETICAL COMPUTER SCIENCE, 2019, 759 : 1 - 13
  • [28] Leakage-resilient authenticated key establishment protocols
    Shin, SH
    Kobara, K
    Imai, H
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 155 - 172
  • [29] Leakage-Resilient Cryptography from Minimal Assumptions
    Carmit Hazay
    Adriana López-Alt
    Hoeteck Wee
    Daniel Wichs
    [J]. Journal of Cryptology, 2016, 29 : 514 - 551
  • [30] Leakage-Resilient Certificateless Signature Under Continual Leakage Model
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (02): : 363 - 386