2014
DOI: 10.1007/s13389-014-0079-5
|View full text |Cite
|
Sign up to set email alerts
|

Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis

Abstract: Abstract. Leakage-resilient cryptography aims at developing new algorithms for which physical security against side-channel attacks can be formally analyzed. Following the work of Dziembowski and Pietrzak at FOCS 2008, several symmetric cryptographic primitives have been investigated in this setting. Most of them can be instantiated with a block cipher as underlying component. Such an approach naturally raises the question whether certain block ciphers are better suited for this purpose. In order to answer thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(15 citation statements)
references
References 34 publications
0
15
0
Order By: Relevance
“…A simple, but unsatisfactory solution to prevent this kind of attacks is to increase the master key, session key and nonce sizes to twice the security level each. More promising approaches focus on the properties of g, in particular the hardness to invert g(·, r) to deduce the key k, as in the scheme by Belaid et al [4]. Our results show that designing secure, efficient re-keying functions remains a challenging task, and that frequent re-keying opens up problems of its own that are not yet fully understood.…”
Section: Application To Other Fresh Re-keying Schemesmentioning
confidence: 84%
See 2 more Smart Citations
“…A simple, but unsatisfactory solution to prevent this kind of attacks is to increase the master key, session key and nonce sizes to twice the security level each. More promising approaches focus on the properties of g, in particular the hardness to invert g(·, r) to deduce the key k, as in the scheme by Belaid et al [4]. Our results show that designing secure, efficient re-keying functions remains a challenging task, and that frequent re-keying opens up problems of its own that are not yet fully understood.…”
Section: Application To Other Fresh Re-keying Schemesmentioning
confidence: 84%
“…This is clearly not compatible with resource-constrained application scenarios. The alternative is to fix the construction by using a function g that is hard to invert, as for instance the one suggested in [4]. It should be hard to recover the master key k from the knowledge of one or a few session keys k * and corresponding nonces r. However, this raises the question how such a cryptographically strong function can be constructed without in turn being very costly to protect against side-channel attacks.…”
Section: Fixing the Schemementioning
confidence: 99%
See 1 more Smart Citation
“…Focusing on the role of key-updating in leakage resilient cryptographic schemes, high-diffusion was proposed as the only mathematical condition required for secure key-updating [8], [15]. Here, we show that this condition is not sufficient with a counter example, and propose new conditions.…”
Section: Security Analysismentioning
confidence: 83%
“…In more detail, it is widely accepted that very small data complexities, i.e., q = 1 and q = 2, have sufficiently small side-channel leakage and do not allow for successful key recovery from DPA attacks [7,46,53,56].…”
Section: Frequent Re-keyingmentioning
confidence: 99%