2017
DOI: 10.46586/tosc.v2017.i3.271-293
|View full text |Cite
|
Sign up to set email alerts
|

On Leakage-Resilient Authenticated Encryption with Decryption Leakages

Abstract: At CCS 2015, Pereira et al. introduced a pragmatic model enabling the study of leakage-resilient symmetric cryptographic primitives based on the minimal use of a leak-free component. This model was recently used to prove the good integrity and confidentiality properties of an authenticated encryption scheme called DTE when the adversary is only given encryption leakages. In this paper, we extend this work by analyzing the case where decryption leakages are also available. We first exhibit attacks exploiting su… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 32 publications
(17 citation statements)
references
References 0 publications
0
17
0
Order By: Relevance
“…(2) Cloud-based video surveillance saves a lot of storage resources and provides a convenient and low-cost monitoring capability for small-scale scene applications such shops and families. However, shops and families often lack security awareness and protection skills, which makes web cameras and monitors (most of the time, the monitor is just a normal personal computer) vulnerable [ 33 , 34 ].…”
Section: Our Workmentioning
confidence: 99%
“…(2) Cloud-based video surveillance saves a lot of storage resources and provides a convenient and low-cost monitoring capability for small-scale scene applications such shops and families. However, shops and families often lack security awareness and protection skills, which makes web cameras and monitors (most of the time, the monitor is just a normal personal computer) vulnerable [ 33 , 34 ].…”
Section: Our Workmentioning
confidence: 99%
“…In [BBC + 20], the authors present a practical side-channel attack against a tag verification implemented on an ARM Cortex-M0. It can directly be used to forge valid messages under adversarial control [BPPS17], and therefore to break the integrity of a software update. We repeat that experiment with two differences: (i) we use an ARM Cortex-M4 which is more noisy, and (ii) we do template attacks in a linear subspace instead of directly in the leakage domain.…”
Section: Tag Recovery Attackmentioning
confidence: 99%
“…While this appears as a strong motivation given the challenge of implementing masking securely on low-end devices [BS20], we observe that the main security property that is required for this purpose is ciphertext integrity with leakage in decryption. As discussed in [BPPS17], this property can be reached with two calls to a strongly protected block cipher and letting most of the other parts of the implementation leak in an unbounded manner. Yet, it requires a careful instantiation of the tag verification.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations