2019
DOI: 10.1007/978-3-030-34621-8_8
|View full text |Cite
|
Sign up to set email alerts
|

Sponges Resist Leakage: The Case of Authenticated Encryption

Abstract: In this work we advance the study of leakage-resilient Authenticated Encryption with Associated Data (AEAD) and lay the theoretical groundwork for building such schemes from sponges. Building on the work of Barwell et al. (ASIACRYPT 2017), we reduce the problem of constructing leakage-resilient AEAD schemes to that of building fixed-input-length function families that retain pseudorandomness and unpredictability in the presence of leakage. Notably, neither property is implied by the other in the leakage-resili… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(22 citation statements)
references
References 19 publications
0
22
0
Order By: Relevance
“…For our use case, we use a composition scheme that can be instantiated using existing hardware accelerators and make use of the results of Krämer and Struck [KS20]. In their work they revisit the so called F GHF construction that was proposed by Degabriele et al [DJS19] in the context of sponge based constructions. The F GHF construction is an LR-AEAD scheme and comprises four building blocks: Two functions F and F , a PRG G and a hash function H. In order for the construction to be leakage resilient, the security analysis of Degabriele et al originally requires both F and F to be pseudorandom under leakage and F to be unpredictable under leakage in addition 2 .…”
Section: Leakage Resilient Authenticated Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…For our use case, we use a composition scheme that can be instantiated using existing hardware accelerators and make use of the results of Krämer and Struck [KS20]. In their work they revisit the so called F GHF construction that was proposed by Degabriele et al [DJS19] in the context of sponge based constructions. The F GHF construction is an LR-AEAD scheme and comprises four building blocks: Two functions F and F , a PRG G and a hash function H. In order for the construction to be leakage resilient, the security analysis of Degabriele et al originally requires both F and F to be pseudorandom under leakage and F to be unpredictable under leakage in addition 2 .…”
Section: Leakage Resilient Authenticated Encryptionmentioning
confidence: 99%
“…We specifically describe the partitioning between software and hardware accelerators. Second, we describe how to use this protected building block together with an LR-PRG and hash function in the LR-AEAD scheme of Degabriele et al [DJS19]. We provide pseudo code for all operations and point out the security critical operations which we analyze in the side-channel evaluation in Sec.…”
Section: Leakage Resilient Aead On Cots Microcontrollersmentioning
confidence: 99%
“…To assess the suitability of the PUF architecture for our side-channel protected secure boot design, a 256-bit output of the core PUF module was generated for testing prior to error correction being applied 5 . This output was regenerated 1001 times at room temperature for each of 20 Xilinx Zynq-7000 devices.…”
Section: Evaluation Of the Pufmentioning
confidence: 99%
“…While not implemented here, using a simple (3, 1, 3) repetition code concatenated with the Golay encoder brings P total down to 3.26 × 10 −8 , trading off additional hardware requirements for the increased reliability. Alternatively, multiple PUF readouts could be taken with a 5 The 256-bit output is for testing purposes only, the full design requires 498 PUF cells. majority vote applied to determine the PUF response.…”
Section: Evaluation Of the Pufmentioning
confidence: 99%
See 1 more Smart Citation