Leakage-resilient Stream Ciphers: an Overview
نویسنده
چکیده
Side-channel attacks are one of the most dangerous threats against secure devices. By exploiting physical properties of the circuits running cryptographic protocols, that is, by analyzing the power consumption, running time, or electomagnetic radiations of circuits computing on secret data, sidechannel attacks circumvent traditional security proofs and show to be extremely effective in breaking the security properties expected from a wide range of devices. Since the first demonstration of the power of side-channel attacks by Kocher, in 1996, a huge body of work has been developing for securing protocol implementations against these attacks, using circuit-level techniques such as gate masking, differential logic styles, or circuit shielding for instance. More recently researchers started addressing the issue of side-channel attacks at the cryptographic protocol level, trying to design protocols in a way that would substantially reduce the security needs at the implementation level, by making protocols leakage resilient. In this talk, we investigate the problem of building leakage resilient stream-ciphers. Stream ciphers or, at their core, pseudorandom stream generators, probably are the most important object one may want to implement securely, as they are part of essentially any cryptographic construction: we need pseudorandomness to run the common challenge-response authentication protocols that are implemented on most low-power secure devices, but also to build any semantically secure encryption scheme for instance. Building efficient and provably secure leakage resilient stream ciphers shows to be a remarkably challenging task. The first challenge consists in defining a security model that captures side-channel attacks in a realistic way. The most common approach consists in allowing the adversary to receive an auxiliary input about the information stored in the device, under
منابع مشابه
A Time-Success Ratio Analysis of wPRF-based Leakage-Resilient Stream Ciphers
Weak pseudorandom functions (wPRFs) found an important application as main building blocks for leakage-resilient ciphers (EUROCRYPT’09). Several security bounds, based on different techniques, were given to these stream ciphers. The security loss in these reduction-based proofs is always polynomial, but has not been studied in detail. The aim of this paper is twofold. First, we present a clear ...
متن کاملPractical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness
One of the main challenges in leakage-resilient cryptography is to obtain proofs of security against side-channel attacks, under realistic assumptions and for efficient constructions. In a recent work from CHES 2012, Faust et al. proposed new designs of stream ciphers and pseudorandom functions for this purpose. Yet, a remaining limitation of these constructions is that they require large amoun...
متن کاملTowards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
Leakage-resilient constructions have attracted significant attention over the last couple of years. In practice, pseudorandom functions are among the most important such primitives, because they are stateless and do not require a secure initialization as, e.g. stream ciphers. However, their deployment in actual applications is still limited by security and efficiency concerns. This paper contri...
متن کاملLeakage-Resilient Signatures
The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insufficient due to “side-channel attacks” which exploit leakage of information about the secret internal state. In this work we put forward the notion of “leakage-resilient signatures,” which strengthens the standard security notion by gi...
متن کاملStream ciphers and the eSTREAM project
Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011