Filters








19 Hits in 6.3 sec

Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis

Sonia Belaïd, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jörn-Marc Schmidt, François-Xavier Standaert, Stefan Tillich
2014 Journal of Cryptographic Engineering  
Leakage-resilient cryptography aims at developing new algorithms for which physical security against side-channel attacks can be formally analyzed.  ...  In order to answer this question, we consider a leakage-resilient rekeying function, and evaluate its security at different abstraction levels.  ...  for the case of leakage-resilient PRFs [26] . In this paper, we embrace a similar strategy and further study the possibilities to design secure and efficient leakage-resilient PRFs.  ... 
doi:10.1007/s13389-014-0079-5 fatcat:272putx2yfhstdfytj4gbisqbi

Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors

Olivier Bronchain, Charles Momin, Thomas Peters, François-Xavier Standaert
2021 Transactions on Cryptographic Hardware and Embedded Systems  
We show that the design of this scheme ignores an important attack vector that can significantly reduce its security claims, and that the evaluation of its leakage-resilient PRF is quite sensitive to minor  ...  s leakage-resilient authenticated encryption scheme from CHES 2020.  ...  Acknowledgments Thomas Peters and François-Xavier Standaert are respectively research associate and senior research associate of the Belgian Fund for Scientific Research (F.R.S.-FNRS).  ... 
doi:10.46586/tches.v2021.i3.641-676 fatcat:7bq2ute76jcghnnc4f7563qm3u

High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction [article]

Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht, Georg Sigl
2018 IACR Cryptology ePrint Archive  
Achieving side-channel resistance through Leakage Resilience (LR) is highly relevant for embedded devices where requirements of other countermeasures such as e.g. high quality random numbers are hard to  ...  Leakage-Resilient Pseudo-Random Functions (LR-PRFs) aim at solving this by bounding side-channel leakage to non-exploitable levels through frequent re-keying.  ...  The work presented in this contribution was supported by the German Federal Ministry of Education and Research in the project ALESSIO through grant number 16KIS0629.  ... 
dblp:journals/iacr/UntersteinHSSS18 fatcat:fskgry2g6fby3cvqr7oqrv7k7e

Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle [article]

Davide Bellizia, Olivier Bronchain, Gaëtan Cassiers, Vincent Grosso, Chun Guo, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2020 IACR Cryptology ePrint Archive  
Triggered by the increasing deployment of embedded cryptographic devices (e.g., for the IoT), the design of authentication, encryption and authenticated encryption schemes enabling improved security against  ...  For this purpose, we first translate the physical assumptions of leakage-resistance proofs into minimum security requirements for implementers.  ...  In our notations, small caps are for resilience to misuse or leakage and capital letters for resistance.  ... 
dblp:journals/iacr/BelliziaBCGGMPP20 fatcat:lzjczutcmvhtbidq6n2o6cszui

Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems [chapter]

Stefan Dziembowski, Sebastian Faust, Gottfried Herold, Anthony Journault, Daniel Masny, François-Xavier Standaert
2016 Lecture Notes in Computer Science  
Most leakage-resilient cryptographic constructions aim at limiting the information adversaries can obtain about secret keys.  ...  Unfortunately, it seems generally hard to avoid the need of (at least one) execution of a stateless primitive, both for encryption and authentication protocols.  ...  primitive (e.g., a PRF or a block cipher) is strictly needed for the deployment of leakage-resilient (symmetric) encryption and MACs [51] .  ... 
doi:10.1007/978-3-662-53008-5_10 fatcat:xy63yuhrf5ajpexha2bdjhlkru

Isap -- Towards Side-Channel Secure Authenticated Encryption

Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer
2017 Zenodo  
Its resistance against side-channel analysis is highly relevant for several applications in practice, like bulk storage settings in general and the protection of FPGA bitfiles and firmware images in particular  ...  In this work, we therefore adapt the re-keying approach and present a symmetric authenticated encryption scheme that is secure against DPA attacks and that does not have such a usage restriction.  ...  Acknowledgments The authors would like to thank Mario Werner for many helpful discussions and providing his hardware description of Keccak.  ... 
doi:10.5281/zenodo.571743 fatcat:jp6cfqekozgutprlkzrkjltu7e

ISAP – Towards Side-Channel Secure Authenticated Encryption

Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer
2017 IACR Transactions on Symmetric Cryptology  
Its resistance against side-channel analysis is highly relevant for several applications in practice, like bulk storage settings in general and the protection of FPGA bitfiles and firmware images in particular  ...  In this work, we therefore adapt the re-keying approach and present a symmetric authenticated encryption scheme that is secure against DPA attacks and that does not have such a usage restriction.  ...  Acknowledgments The authors would like to thank Mario Werner for many helpful discussions and providing his hardware description of Keccak.  ... 
doi:10.13154/tosc.v2017.i1.80-105 dblp:journals/tosc/DobraunigEMMU17 fatcat:i3piy7voorcrzmnkfe57fuftzu

ISAP – Towards Side-Channel Secure Authenticated Encryption

Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer
2017 IACR Transactions on Symmetric Cryptology  
Its resistance against side-channel analysis is highly relevant for several applications in practice, like bulk storage settings in general and the protection of FPGA bitfiles and firmware images in particular  ...  In this work, we therefore adapt the re-keying approach and present a symmetric authenticated encryption scheme that is secure against DPA attacks and that does not have such a usage restriction.  ...  Acknowledgments The authors would like to thank Mario Werner for many helpful discussions and providing his hardware description of Keccak.  ... 
doi:10.46586/tosc.v2017.i1.80-105 fatcat:ca3nkrhot5e7pc2l6amxztafje

Secure and Efficient Query Processing in Outsourced Databases [article]

Dmytro Bogatov
2022 arXiv   pre-print
For the attacks, we build an LSTM model that trains on the correlation between a sentence and its embedding and then predicts words from the embedding.  ...  We use TREC datasets and queries for the search, and track the rank quality metrics such as MRR and nDCG.  ...  We analyzed the correlation between the accuracy and security, and concluded that the approach provides meaningful and tunable security and attack resiliency guarantees for a comparatively small penalty  ... 
arXiv:2206.10753v1 fatcat:mgjmrvs52zef3aioswftvfd3fa

TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications

Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2019 Transactions on Cryptographic Hardware and Embedded Systems  
Moreover, the leakage integrity bound is asymptotically optimal in the multi-user setting.  ...  (ii) It offers nonce misuse-resilience, that is, the repetition of nonces does not impact the security of ciphertexts produced with fresh nonces.  ...  the latter are expected to use PRF/PRPs that are weak w.r.t. leakage-resilience.  ... 
doi:10.13154/tches.v2020.i1.256-320 dblp:journals/tches/BertiGPPS20 fatcat:kqbuclxmdjdcxn4ai4ihgsa7ce

Security Analysis of PUF-based Key Generation and Entity Authentication

Jeroen Delvaux
2017 Zenodo  
PUFs can augment the security architecture of an ever-increasing number of electronic devices that access our personal data and/or represent our identities.  ...  We analyze the security of such multi-component systems in a format that allows for comparisons among proposals that have similar or identical objectives.  ...  It is unclear whether the authors may have intended to use a fuzzy extractor in an implicit manner, but even if so, its related security and efficiency concerns would not have been reflected properly.  ... 
doi:10.5281/zenodo.2643392 fatcat:2pcr7p76qjbtnh36fuxsdk7enq

Eluding Secure Aggregation in Federated Learning via Model Inconsistency [article]

Dario Pasquini, Danilo Francati, Giuseppe Ateniese
2022 arXiv   pre-print
The attacks are generic and equally effective regardless of the secure aggregation protocol used.  ...  Indeed, the use of secure aggregation prevents the server from learning the value and the source of the individual model updates provided by the users, hampering inference and data attribution attacks.  ...  We acknowledge the generous support of Accenture and the collaboration with their Labs in Sophia Antipolis.  ... 
arXiv:2111.07380v5 fatcat:c7r4rgx2ardl5g3bmlctymxzau

Engineering, Technology & Applied Science Research (ETASR), Vol. 11, No. 4, pp. 7291-7530

Various
2021 Zenodo  
ISSN: 1792-8036 and 2241-4487.  ...  of science application, technology, and engineering.  ...  In this paper, a mechanism for the protection of endpoint security is developed using IP address host shuffling.  ... 
doi:10.5281/zenodo.5506592 fatcat:73sj5nawgndeffb26wh6wnux4a

Practical Private Set Intersection Protocols for Privacy-Preserving Applications

Christian Weinert
2021
, mutual authentication for Apple AirDrop, and database intersection analytics.  ...  While this simple functionality turns out to be instrumental for many real-world applications, existing protocol designs and implementations unfortunately incur an impractical computation and/or communication  ...  We thank Oleksandr Tkachenko for his invaluable help with the implementation and benchmarking. We also thank Moni Naor for suggesting the application to achieve differential privacy.  ... 
doi:10.26083/tuprints-00019295 fatcat:mcrri3mvh5a3jois3hzpolx3ae

Security matters:privacy in voting and fairness in digital exchange [article]

Jonker, HL (Hugo), Mauw, S (Sjouke), Baeten, JCM (Jos), Pang, J (Jun)
2009
Security objectives are embedded in a context with other security objectives, a system, users of the system and a malevolent entity, called the intruder, who seeks to upset the system's objectives.  ...  There exists a hierarchy of public keys, with the public key of the root authority embedded in each compliant device and available to content providers.  ...  The intruder controls the communication network and is the owner of devices d1 and d2 .  ... 
doi:10.6100/ir643467 fatcat:vlcfc6brhvbzji4lwq5tlj43ie
« Previous Showing results 1 — 15 out of 19 results