On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient Cryptographic Construction

نویسندگان

  • Guangjun Fan
  • Yongbin Zhou
  • François-Xavier Standaert
  • Dengguo Feng
چکیده

Leakage resilient cryptography aims to address the issue of inadvertent and unexpected information leakages from physical cryptographic implementations at algorithmic level in a provable manner. In real world, for an abstract mathematical construction to be an actual physical implementation, it usually undergoes two phases: mathematical realization at algorithmic level and physical realization at implementation level. In the former process, an abstract and generic cryptographic construction is being transformed into an exact and specified mathematical scheme, while in the latter process the output of mathematical realization is being transformed into a physical cryptographic module that runs as a piece of software, or hardware, or combination of both. It turns out that physical realization bears negatively and directly on the security of any cryptographic implementations, which means that the theoretical security of any mathematical cryptographic scheme in leakage free setting (a.k.a. black-box model) does not hold any more when it is implemented and running at physical realization level in leaky setting (e.g. in the context of side-channel attacks). However, it is not clear that whether or not the theoretical security of one leakage resilient cryptographic scheme will still remain secure with considering any details of mathematical realizations. In other words, whether or not the theoretical leakage resilience of one leakage resilient cryptographic construction will still keep unchanged and/or slightly changed, if this scheme is instantiated with cryptographic components that meet their claimed security properties. In this paper, we try to answer this question of important theoretical values, by presenting attacks on three mathematical realizations of the leakage resilient ElGamal encryption scheme EG∗ in the paper of E. Kiltz et al. at Asiacrypt2010. Our results convincingly indicate that mathematical realizations of EG∗ really have significant destructive impact on its theoretical leakage resilience. This important discovery is not considered or neglected in previous work. Our results suggest that a leakage resilient scheme with considering the mathematical realization may not be secure any more.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient ElGamal Encryption

Leakage resilient cryptography aims to address the issue of inadvertent and unexpected information leakages from physical cryptographic implementations. At Asiacrypt 2010, E.Kiltz et al. [1] presented a multiplicatively blinded version of ElGamal public-key encryption scheme, which is proved to be leakage resilient in the generic group model against roughly 0.50*log(p) bits of arbitrary, advers...

متن کامل

On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes

In real world, in order to transform an abstract and generic cryptographic scheme into actual physical implementation, one usually undergoes two processes: mathematical realization at algorithmic level and physical realization at implementation level. In the former process, the abstract and generic cryptographic scheme is transformed into an exact and specific mathematical scheme, while in the ...

متن کامل

Circuit Compilers with O(1/\log (n)) Leakage Rate

The goal of leakage-resilient cryptography is to construct cryptographic algorithms that are secure even if the devices on which they are implemented leak information to the adversary. One of the main parameters for designing leakage resilient constructions is the leakage rate, i.e., a proportion between the amount of leaked information and the complexity of the computation carried out by the c...

متن کامل

Achieving Constant Round Leakage-Resilient Zero-Knowledge

Recently there has been a huge emphasis on constructing cryptographic protocols that maintain their security guarantees even in the presence of side channel attacks. Such attacks exploit the physical characteristics of a cryptographic device to learn useful information about the internal state of the device. Designing protocols that deliver meaningful security even in the presence of such leaka...

متن کامل

Practical Leakage-Resilient Symmetric Cryptography

Leakage resilient cryptography attempts to incorporate sidechannel leakage into the black-box security model and designs cryptographic schemes that are provably secure within it. Informally, a scheme is leakage-resilient if it remains secure even if an adversary learns a bounded amount of arbitrary information about the schemes internal state. Unfortunately, most leakage resilient schemes are u...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013