Filters








2,298 Hits in 6.1 sec

Improved Constructions of PRFs Secure Against Related-Key Attacks [chapter]

Kevin Lewi, Hart Montgomery, Ananth Raghunathan
2014 Lecture Notes in Computer Science  
As a result, we achieve the first PRFs from lattices secure against an (almost) linear class of related-key functions.  ...  Building cryptographic primitives that are secure against related-key attacks (RKAs) is a well-studied problem by practitioners and theoreticians alike.  ...  Conclusions We construct the first lattice-based PRFs secure against a class of related-key attacks from an (almost) linear class of functions.  ... 
doi:10.1007/978-3-319-07536-5_4 fatcat:6tubyllv5bduxal5qmoljazg64

Ciphers Secure against Related-Key Attacks [chapter]

Stefan Lucks
2004 Lecture Notes in Computer Science  
This paper studies the security of PRF-and PRP-constructions against related-key attacks.  ...  As it turned out, the security of a scheme against related-key attacks greatly depends on the adversary's capabilities, namely on the set of key transformations available to her.  ...  -In Section 3, we explore equivalent constructions for related-key secure PRFs, and we consider the composition of conventionally secure and related-key secure PRFs.  ... 
doi:10.1007/978-3-540-25937-4_23 fatcat:evqum7qqsrcoviup3jfozxzzfq

Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs [chapter]

Marcel Medwed, François-Xavier Standaert, Antoine Joux
2012 Lecture Notes in Computer Science  
On the other hand, we present tweaks for tree-based leakage-resilient PRFs that improve their efficiency and their security, by taking advantage of parallel implementations.  ...  Our security analyses are based on worst-case attacks in a noise-free setting and suggest that under reasonable assumptions, the side-channel resistance of our construction grows super-exponentially with  ...  Efficiently Exploiting Parallelism In this section, we study how parallelism improves the security against DPA attacks and the efficiency of a tree-based PRF.  ... 
doi:10.1007/978-3-642-33027-8_12 fatcat:zcsby2htsjezvhzithkrgkinca

Notions and relations for RKA-secure permutation and function families

Jongsung Kim, Jaechul Sung, Ermaliza Razali, Raphael C.-W. Phan, Marc Joye
2010 Designs, Codes and Cryptography  
We can exploit it to get various constructions secure against some classes of related-key attacks from known MAC algorithms.  ...  of SPRP against some classes of related-key attacks (SPRP-RKA).  ...  Also we thank anonymous referees for their constructive comments.  ... 
doi:10.1007/s10623-010-9414-8 fatcat:ajkmyhcgojfx3mryyogqjrnaiu

A Time-Success Ratio Analysis of wPRF-based Leakage-Resilient Stream Ciphers [article]

Maciej Skorski
2015 arXiv   pre-print
Second, we revisit the current proof techniques and answer the natural question of how far we are from meaningful and provable security guarantees, when instantiating weak PRFs with standard primitives  ...  The aim of this paper is twofold. First, we present a clear comparison of quantitatively different security bounds in the literature.  ...  We consider the security of AES256 as a weak PRF, and not a standard PRF, because of non-uniform attacks which show that no PRF with a k bit key can have s/ǫ ≈ 2 k security [DTT09] , at least unless we  ... 
arXiv:1505.06765v1 fatcat:ludquy3dejfg3o7zacskftkefy

Secret-key cryptography from ideal primitives: A systematic overview

Peter Gazi, Stefano Tessaro
2015 2015 IEEE Information Theory Workshop (ITW)  
Secret-key constructions are often proved secure in a model where one or more underlying components are replaced by an idealized oracle accessible to the attacker.  ...  This paper provides a systematic overview of what is achievable in this model, and how existing works fit into this view.  ...  Very recently, the notion of PRF and PRP security against related-key attacks has also been shown to be attainable in [14] , [8] .  ... 
doi:10.1109/itw.2015.7133163 dblp:conf/itw/GaziT15 fatcat:savmeulb2reuposgktwxjq5jxi

The Exact PRF-Security of NMAC and HMAC [chapter]

Peter Gaži, Krzysztof Pietrzak, Michal Rybár
2014 Lecture Notes in Computer Science  
PRF against q queries of length at most blocks each.  ...  -Our first contribution is a simpler and uniform proof for this fact: If f is an ε-secure PRF (against q queries) and a δ-non-adaptively secure PRF (against q queries), then NMAC f is an (ε + qδ)-secure  ...  Moreover, security of the single-key version of HMAC requires the PRF to be secure under a specific class of related-key attacks.  ... 
doi:10.1007/978-3-662-44371-2_7 fatcat:73lqg3xzgnbdbk4oyf5x5c7yeu

Optimal PRFs from Blockcipher Designs

Bart Mennink, Samuel Neves
2017 IACR Transactions on Symmetric Cryptology  
It shows strong resemblance with the optimally secure EDMD construction by Mennink and Neves (CRYPTO 2017), but the use of internal state values make their security analysis formally inapplicable.  ...  We conjecture that our main proposal AES-PRF, AES with a feed-forward of the middle state, achieves close to optimal security.  ...  The authors are thankful to the anonymous reviewers of FSE 2018 for their useful technical comments, to Pierre Karpman and Atul Luykx for preliminary discussions, to Tetsu Iwata and Yannick Seurin for  ... 
doi:10.13154/tosc.v2017.i3.228-252 dblp:journals/tosc/MenninkN17 fatcat:2xfj5naymrhypmfisq3tk7l4xu

Optimal PRFs from Blockcipher Designs

Bart Mennink, Samuel Neves
2017 IACR Transactions on Symmetric Cryptology  
It shows strong resemblance with the optimally secure EDMD construction by Mennink and Neves (CRYPTO 2017), but the use of internal state values make their security analysis formally inapplicable.  ...  We conjecture that our main proposal AES-PRF, AES with a feed-forward of the middle state, achieves close to optimal security.  ...  The authors are thankful to the anonymous reviewers of FSE 2018 for their useful technical comments, to Pierre Karpman and Atul Luykx for preliminary discussions, to Tetsu Iwata and Yannick Seurin for  ... 
doi:10.46586/tosc.v2017.i3.228-252 fatcat:g67mmdob7vd3ferfjkw2dphxgu

The Related-Key Analysis of Feistel Constructions [chapter]

Manuel Barbosa, Pooya Farshim
2015 Lecture Notes in Computer Science  
However, irrespective of the number of rounds, no Feistel construction can resist related-key attacks where the keys can be offset by a constant.  ...  In this paper we show that, under suitable reuse of round keys, security under related-key attacks can be provably attained.  ...  Pooya Farshim was supported by grant Fi 940/4-1 of the German Research Foundation (DFG).  ... 
doi:10.1007/978-3-662-46706-0_14 fatcat:gg7huflgxvebdns7mcphyuma5u

Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions [chapter]

Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls
2010 Information Security and Cryptography  
We construct a block cipher based on PUF-PRFs that allows simultaneous protection against algorithmic and physical attackers, in particular against memory attacks.  ...  PUFs enjoy their security from physical structures at submicron level and are very useful primitives to protect against memory attacks.  ...  An improved and practical PUF-PRF construction.  ... 
doi:10.1007/978-3-642-14452-3_6 dblp:series/isc/ArmknechtMSST10 fatcat:676z7f56arfo5b7viqnlcdmdlu

Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions [chapter]

Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls
2009 Lecture Notes in Computer Science  
We construct a block cipher based on PUF-PRFs that allows simultaneous protection against algorithmic and physical attackers, in particular against memory attacks.  ...  PUFs enjoy their security from physical structures at submicron level and are very useful primitives to protect against memory attacks.  ...  An improved and practical PUF-PRF construction.  ... 
doi:10.1007/978-3-642-10366-7_40 fatcat:3h5uf4q6yrghrfsgrn42qgfhga

Secure Message Authentication Against Related-Key Attack [chapter]

Rishiraj Bhattacharyya, Arnab Roy
2014 Lecture Notes in Computer Science  
Security against related-key attacks is an important criteria for modern cryptographic constructions.  ...  We show that unlike PRFs, MACs can inherently tolerate related-key attacks against constant transformations.  ...  Part of this work was done when Rishi was at the Centre of Excellence in Cryptology of Indian Statistical Institute, Kolkata.  ... 
doi:10.1007/978-3-662-43933-3_16 fatcat:yz3xlvuk4zcgvbets5efbfc5sm

Leakage-Resilient Symmetric Encryption via Re-keying [chapter]

Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque
2013 Lecture Notes in Computer Science  
The main advantage of the AES block cipher is that its implementations are generally heuristically-secure against SPA adversaries.  ...  Indeed, in such analysis, the adversary queries the encryption box and from the knowledge of the plaintext/ciphertext, she can perform a divide-and-conquer key recovery attack.  ...  Since the related keys leak, we replace all the invocations of the related weak PRFs φ 2 and φ 3 by truly random functions: R ← R n,n : K j ← $ for all keys generated from low keys c i ← φ(K i , r i )  ... 
doi:10.1007/978-3-642-40349-1_27 fatcat:tmlge3hzsfbevl2rvhsjq54v2a

Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers

Florian Unterstein, Marc Schink, Thomas Schamberger, Lars Tebelmann, Manuel Ilg, Johann Heyszl
2020 Transactions on Cryptographic Hardware and Embedded Systems  
The LR-PRF construction leverages frequent key changes and low data complexity together with key dependent noise from parallel hardware to protect against side-channel attacks.  ...  In this work, we demonstrate how unprotected hardware AES engines of COTS microcontrollers can be efficiently protected against side-channel attacks by constructing a leakage resilient pseudo random function  ...  Acknowledgments The work presented in this contribution was supported by the German Federal Ministry of Education and Research in the project ALESSIO through grant number 16KIS0629 and 16KIS0632.  ... 
doi:10.13154/tches.v2020.i4.365-388 dblp:journals/tches/UntersteinSSTIH20 fatcat:vly45rwqdzhrjagqernn7vhdva
« Previous Showing results 1 — 15 out of 2,298 results