2013
DOI: 10.1007/978-3-642-40041-4_19
|View full text |Cite
|
Sign up to set email alerts
|

Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions

Abstract: Abstract. Leakage-resilient cryptography aims at formally proving the security of cryptographic implementations against large classes of side-channel adversaries. One important challenge for such an approach to be relevant is to adequately connect the formal models used in the proofs with the practice of side-channel attacks. It raises the fundamental problem of finding reasonable restrictions of the leakage functions that can be empirically verified by evaluation laboratories. In this paper, we first argue th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
56
0
1

Year Published

2014
2014
2019
2019

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 51 publications
(57 citation statements)
references
References 37 publications
0
56
0
1
Order By: Relevance
“…In this model only actual computations are supposed to leak sensitive information. This captures the usual situation in side-channel attacks, where leakage data only depend on the current state of the target device and some independent randomness [32]. The internal data of the device are divided into two parts, an active and a passive part, the active part being the input data used in the current computation.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In this model only actual computations are supposed to leak sensitive information. This captures the usual situation in side-channel attacks, where leakage data only depend on the current state of the target device and some independent randomness [32]. The internal data of the device are divided into two parts, an active and a passive part, the active part being the input data used in the current computation.…”
Section: Introductionmentioning
confidence: 99%
“…Several contemporary works [4,27,32] have put forward ways to redefine the above models and bring them closer to practice, for symmetric cryptography primitives. This comes at the cost of algorithmic-level specialization, providing models that are indeed more realistic, but which apply to a more restrained class of primitives (i.e., pseudorandom generators, block ciphers).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Prominent sources of such physical leakages include the running time of an implementation [17], its power consumption [18] or electromagnetic radiation emitting from it [27]. A large body of recent applied and theoretical research attempts to incorporate the information an adversary obtains from the leakage into the security analysis and develops countermeasures to defeat common side-channel attacks [4,14,21,1,9,32,31]. While there is still a large gap between what theoretical models can achieve and what side-channel information is measured in practice, some recent important works propose models that better go align with the perspective of cryptographic engineering [30,25,31].…”
Section: Introductionmentioning
confidence: 99%
“…At Crypto'13, Standaert et al [19] proposed a new notion for leakage resilience involving simulators. The intuition behind their proposal is that if an adversary cannot tell the difference between real leakage and simulated leakage (from a simulator that does not know the secret key), then clearly the leakage does not reveal any information about the secret key.…”
Section: Introductionmentioning
confidence: 99%