Medwed, Marcel
[NXP Semiconductors Austria, Gratkorn/Austria]
Standaert, François-Xavier
[UCL]
Feldhofer, Martin
[NXP Semiconductors Austria, Gratkorn/Austria]
Nikov, Ventzislav
[NXP Semiconductors , Leuven/Belgium]
In this work we present a leakage-resilient PRF which makes use of parallel block cipher implementations with unknown-inputs. To the best of our knowledge this is the first work to study and exploit unknown-inputs as a form of key-dependent algorithmic noise. It turns out that such noise renders the problem of side-channel key recovery intractable under very little and easily satisfiable assumptions. That is, the construction stays secure even in a noise-free setting and independent of the number of traces and the used power model. The contributions of this paper are as follows. First, we present a PRF construction which offers attractive security properties, even when instantiated with the AES. Second, we study the effect of unknown-input attacks in parallel implementations.We put forward their intractability and explain it by studying the inevitable model errors obtained when building templates in such a scenario. Third, we compare the security of our construction to the CHES 2012 one and show that it is superior in many ways. That is, a standard block cipher can be used, the security holds for all intermediate variables and it can even partially tolerate local EM attacks and some typical implementation mistakes or hardware insufficiencies. Finally, we discuss the performance of a standard-cell implementation.
- Abdalla Michel, Belaïd Sonia, Fouque Pierre-Alain, Leakage-Resilient Symmetric Encryption via Re-keying, Cryptographic Hardware and Embedded Systems - CHES 2013 (2013) ISBN:9783642403484 p.471-488, 10.1007/978-3-642-40349-1_27
- Balasch Josep, Gierlichs Benedikt, Grosso Vincent, Reparaz Oscar, Standaert François-Xavier, On the Cost of Lazy Engineering for Masked Software Implementations, Smart Card Research and Advanced Applications (2015) ISBN:9783319167626 p.64-81, 10.1007/978-3-319-16763-3_5
- Belaïd Sonia, Grosso Vincent, Standaert François-Xavier, Masking and leakage-resilient primitives: One, the other(s) or both?, 10.1007/s12095-014-0113-6
- Belaïd, S., De Santis, F., Heyszl, J., Mangard, S., Medwed, M., Schmidt, J.-M., Standaert, F.-X., Tillich, S.: Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis. J. Cryptographic Eng. 4(3), 157–171 (2014)
- Bilgin Begül, Gierlichs Benedikt, Nikova Svetla, Nikov Ventzislav, Rijmen Vincent, Higher-Order Threshold Implementations, Lecture Notes in Computer Science (2014) ISBN:9783662456071 p.326-343, 10.1007/978-3-662-45608-8_18
- Bilgin Begül, Gierlichs Benedikt, Nikova Svetla, Nikov Ventzislav, Rijmen Vincent, A More Efficient AES Threshold Implementation, Progress in Cryptology – AFRICACRYPT 2014 (2014) ISBN:9783319067339 p.267-284, 10.1007/978-3-319-06734-6_17
- Chari Suresh, Jutla Charanjit S., Rao Josyula R., Rohatgi Pankaj, Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology — CRYPTO’ 99 (1999) ISBN:9783540663478 p.398-412, 10.1007/3-540-48405-1_26
- Coron Jean-Sébastien, Giraud Christophe, Prouff Emmanuel, Renner Soline, Rivain Matthieu, Vadnala Praveen Kumar, Conversion of Security Proofs from One Leakage Model to Another: A New Issue, Constructive Side-Channel Analysis and Secure Design (2012) ISBN:9783642299117 p.69-81, 10.1007/978-3-642-29912-4_6
- Dodis Yevgeniy, Pietrzak Krzysztof, Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks, Advances in Cryptology – CRYPTO 2010 (2010) ISBN:9783642146220 p.21-40, 10.1007/978-3-642-14623-7_2
- Duc, A., Faust, S., Standaert, F.-X.: Making masking security proofs concrete or how to evaluate the security of any leaking device (extended version). Cryptology ePrint Archive, Report 2015/119 (2015). http://eprint.iacr.org/
- Faust Sebastian, Pietrzak Krzysztof, Schipper Joachim, Practical Leakage-Resilient Symmetric Cryptography, Cryptographic Hardware and Embedded Systems – CHES 2012 (2012) ISBN:9783642330261 p.213-232, 10.1007/978-3-642-33027-8_13
- Fumaroli Guillaume, Martinelli Ange, Prouff Emmanuel, Rivain Matthieu, Affine Masking against Higher-Order Side Channel Analysis, Selected Areas in Cryptography (2011) ISBN:9783642195730 p.262-280, 10.1007/978-3-642-19574-7_18
- Goldreich Oded, Goldwasser Shafi, Micali Silvio, How to construct random functions, 10.1145/6490.6503
- Grosso, V., Poussier, R., Standaert, F.-X., Gaspar, L.: Combining leakage-resilient prfs and shuffling - towards bounded security for small embedded devices. In: Joye and Moradi [16], pp. 122–136
- Ishai Yuval, Sahai Amit, Wagner David, Private Circuits: Securing Hardware against Probing Attacks, Advances in Cryptology - CRYPTO 2003 (2003) ISBN:9783540406747 p.463-481, 10.1007/978-3-540-45146-4_27
- Joye, M., Moradi, A. (eds.): CARDIS 2014. LNCS, vol. 8968. Springer, Heidelberg (2015)
- Mangard Stefan, Popp Thomas, Gammel Berndt M., Side-Channel Leakage of Masked CMOS Gates, Lecture Notes in Computer Science (2005) ISBN:9783540243991 p.351-365, 10.1007/978-3-540-30574-3_24
- Mangard Stefan, Pramstaller Norbert, Oswald Elisabeth, Successfully Attacking Masked AES Hardware Implementations, Cryptographic Hardware and Embedded Systems – CHES 2005 (2005) ISBN:9783540284741 p.157-171, 10.1007/11545262_12
- Mather Luke, Oswald Elisabeth, Whitnall Carolyn, Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer, Lecture Notes in Computer Science (2014) ISBN:9783662456101 p.243-261, 10.1007/978-3-662-45611-8_13
- Medwed Marcel, Standaert François-Xavier, Joux Antoine, Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs, Cryptographic Hardware and Embedded Systems – CHES 2012 (2012) ISBN:9783642330261 p.193-212, 10.1007/978-3-642-33027-8_12
- Micali Silvio, Reyzin Leonid, Physically Observable Cryptography, Theory of Cryptography (2004) ISBN:9783540210009 p.278-296, 10.1007/978-3-540-24638-1_16
- Moradi Amir, Poschmann Axel, Ling San, Paar Christof, Wang Huaxiong, Pushing the Limits: A Very Compact and a Threshold Implementation of AES, Advances in Cryptology – EUROCRYPT 2011 (2011) ISBN:9783642204647 p.69-88, 10.1007/978-3-642-20465-4_6
- Nikova Svetla, Rijmen Vincent, Schläffer Martin, Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches, 10.1007/s00145-010-9085-7
- Pereira Olivier, Standaert François-Xavier, Vivek Srinivas, Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives, 10.1145/2810103.2813626
- Prouff, E., Schaumont, P. (eds.): CHES 2012. LNCS, vol. 7428. Springer, Heidelberg (2012)
- Rivain Matthieu, Prouff Emmanuel, Provably Secure Higher-Order Masking of AES, Cryptographic Hardware and Embedded Systems, CHES 2010 (2010) ISBN:9783642150302 p.413-427, 10.1007/978-3-642-15031-9_28
- Standaert François-Xavier, Pereira Olivier, Yu Yu, Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions, Advances in Cryptology – CRYPTO 2013 (2013) ISBN:9783642400407 p.335-352, 10.1007/978-3-642-40041-4_19
- Standaert François-Xavier, Pereira Olivier, Yu Yu, Quisquater Jean-Jacques, Yung Moti, Oswald Elisabeth, Leakage Resilient Cryptography in Practice, Information Security and Cryptography (2010) ISBN:9783642144516 p.99-134, 10.1007/978-3-642-14452-3_5
- Standaert François-Xavier, Veyrat-Charvillon Nicolas, Oswald Elisabeth, Gierlichs Benedikt, Medwed Marcel, Kasper Markus, Mangard Stefan, The World Is Not Enough: Another Look on Second-Order DPA, Advances in Cryptology - ASIACRYPT 2010 (2010) ISBN:9783642173721 p.112-129, 10.1007/978-3-642-17373-8_7
- Veyrat-Charvillon Nicolas, Gérard Benoît, Renauld Mathieu, Standaert François-Xavier, An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks, Selected Areas in Cryptography (2013) ISBN:9783642359989 p.390-406, 10.1007/978-3-642-35999-6_25
- Veyrat-Charvillon Nicolas, Medwed Marcel, Kerckhof Stéphanie, Standaert François-Xavier, Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note, Advances in Cryptology – ASIACRYPT 2012 (2012) ISBN:9783642349607 p.740-757, 10.1007/978-3-642-34961-4_44
- Yu Yu, Standaert François-Xavier, Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness, Topics in Cryptology – CT-RSA 2013 (2013) ISBN:9783642360947 p.223-238, 10.1007/978-3-642-36095-4_15
Bibliographic reference |
Medwed, Marcel ; Standaert, François-Xavier ; Feldhofer, Martin ; Nikov, Ventzislav. Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF.22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2016) (Hanoi (Vietnam), du 04/12/2016 au 08/12/2016). In: Jung Hee Cheon, Tsuyoshi Takagi, Proceedings of the 22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2016), Springer2016, p. 602-623 |
Permanent URL |
http://hdl.handle.net/2078.1/181924 |