Extractors against side-channel attacks: weak or strong?

被引:7
|
作者
Medwed, Marcel [1 ]
Standaert, Francois-Xavier [1 ]
机构
[1] Catholic Univ Louvain, UCL Crypto Grp, Pl Levant 3, B-1348 Louvain La Neuve, Belgium
关键词
Randomness extractors; Side-channel analysis; Countermeasures;
D O I
10.1007/s13389-011-0014-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Randomness extractors are important tools in cryptography. Their goal is to compress a high-entropy source into a more uniform output. Beyond their theoretical interest, they have recently gained attention because of their use in the design and proof of leakage-resilient primitives, such as stream ciphers and pseudorandom functions. However, for these proofs of leakage resilience to be meaningful in practice, it is important to instantiate and implement the components they are based on. In this context, while numerousworks have investigated the implementation properties of block ciphers such as the AES Rijndael, very little is known about the application of side-channel attacks against extractor implementations. In order to close this gap, this paper instantiates a low-cost hardware extractor and analyzes it both from a performance and from a side-channel security point of view. Our investigations lead to contrasted conclusions. On one hand, extractors can be efficiently implemented and protected with masking. On the other hand, they provide adversaries with many more exploitable leakage samples than, e. g. block ciphers. As a result, they can ensure high security margins against standard (non-profiled) side-channel attacks and turn out to be much weaker against profiled attacks. From a methodological point of view, our analysis consequently raises the question of which attack strategies should be considered in security evaluations.
引用
收藏
页码:231 / 241
页数:11
相关论文
共 50 条
  • [41] Soft Analytical Side-Channel Attacks
    Veyrat-Charvillon, Nicolas
    Gerard, Benoit
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 282 - 296
  • [42] Cache Side-Channel Attacks and Defenses
    Zhang W.
    Bai L.
    Ling Y.
    Lan X.
    Jia X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [43] Side-Channel Attacks: A Short Tour
    Piessens, Frank
    van Oorschot, Paul C.
    Piessens, Frank
    van Oorshot, Paul C.
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 75 - 80
  • [44] Architecting against Software Cache-Based Side-Channel Attacks
    Kong, Jingfei
    Aciicmez, Onur
    Seifert, Jean-Pierre
    Zhou, Huiyang
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (07) : 1276 - 1288
  • [45] Adaptive caches as a defense mechanism against cache side-channel attacks
    Bandara, Sahan
    Kinsy, Michel A.
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2021, 11 (03) : 239 - 255
  • [46] Securing designs against scan-based side-channel attacks
    Lee, Jeremy
    Tehranipoor, Mohammad
    Patel, Chintan
    Plusquellic, Jim
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) : 325 - 336
  • [47] MEAS: memory encryption and authentication secure against side-channel attacks
    Unterluggauer, Thomas
    Werner, Mario
    Mangard, Stefan
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2019, 9 (02) : 137 - 158
  • [48] INVITED: Protecting RISC-V against Side-Channel Attacks
    De Mulder, Elke
    Gummalla, Samatha
    Hutter, Michael
    PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [49] A New Countermeasure against Scan-Based Side-Channel Attacks
    Luo, Yanhui
    Cui, Aijiao
    Qu, Gang
    Li, Huawei
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 1722 - 1725
  • [50] Adaptive Caches as a Defense Mechanism Against Cache Side-Channel Attacks
    Bandara, Sahan
    Kinsy, Michel A.
    PROCEEDINGS OF THE 3RD ACM WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY WORKSHOP (ASHES '19), 2019, : 55 - 64