1,465 Hits in 3.9 sec

Theory and Practice of a Leakage Resilient Masking Scheme [chapter]

Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Ingrid Verbauwhede
2012 Lecture Notes in Computer Science  
In this work, we take a further step towards closing the gap between theoretical leakage resilient cryptography and more practice-oriented research.  ...  A recent trend in cryptography is to formally prove the leakage resilience of cryptographic implementations -that is, one formally shows that a scheme remains provably secure even in the presence of side  ...  In the theory community, masking-based countermeasures are analyzed within the framework of leakage resilient circuit compilers introduced by Ishai et al. [20] .  ... 
doi:10.1007/978-3-642-34961-4_45 fatcat:dcl76v7qarbj5a2htolekho4te

Unifying Leakage Models: From Probing Attacks to Noisy Leakage [chapter]

Alexandre Duc, Stefan Dziembowski, Sebastian Faust
2014 Lecture Notes in Computer Science  
Our work can be viewed as a next step of closing the gap between theory and practice in leakage resilient cryptography: while our security proofs heavily rely on concepts of theoretical cryptography, we  ...  (CRYPTO 99), the recent work of Prouff and Rivain (Eurocrypt 2013) provides the first analysis of a full masking scheme under a physically motivated noise model.  ...  With the emerge of leakage resilient cryptography [20, 1, 9] several works have proposed new security models and alternative masking schemes.  ... 
doi:10.1007/978-3-642-55220-5_24 fatcat:nqfbv7vsnvagjlnxrugu5p4etu

Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice [chapter]

Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti
2015 Lecture Notes in Computer Science  
The approach makes use of the inner product extractor and guarantees security in the presence of leakage in a widely accepted model.  ...  In specific settings, such as RFID, where a low computational complexity is required, it is hard to apply standard techniques to achieve resilience against this kind of attacks.  ...  We will show how to perform a leakage-resilient computation of the LPN-based protocol Lapin and give implementation results.  ... 
doi:10.1007/978-3-319-28166-7_32 fatcat:oojeegyvhfcdvljcagn37t7uaa

Unifying Leakage Models: From Probing Attacks to Noisy Leakage

Alexandre Duc, Stefan Dziembowski, Sebastian Faust
2018 Journal of Cryptology  
A recent trend in cryptography is to formally show the leakage resilience of cryptographic implementations in a given leakage model.  ...  In particular, the authors show that a block-cipher implementation that uses the Boolean masking scheme is secure against a very general class of noisy leakage functions.  ...  , and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.  ... 
doi:10.1007/s00145-018-9284-1 fatcat:ay5wagyyxzad5npp57txtyb37a

Circuit Masking: From Theory to Standardization, A Comprehensive Survey for Hardware Security Researchers and Practitioners [article]

Ana Covic, Fatemeh Ganji, Domenic Forte
2021 arXiv   pre-print
To formally verify the security of a masking scheme, numerous attack models have been developed to capture the physical properties of the information leakage as well as the capabilities of the adversary  ...  Thus, this survey serves as an essential reference for hardware security practitioners interested in the theory behind masking techniques, the tools useful to verify the security of masked circuits, and  ...  Soon after its introduction, masking became one of the topics that have attracted a great deal of attention from researchers working on not only the theory of leakage-resilient cryptography, but also the  ... 
arXiv:2106.12714v2 fatcat:djqmxdobv5e3becegkmscz2zae

Leakage Bounds for Gaussian Side Channels [chapter]

Thomas Unterluggauer, Thomas Korak, Stefan Mangard, Robert Schilling, Luca Benini, Frank K. Gürkaynak, Michael Muehlberghuber
2018 Lecture Notes in Computer Science  
In recent years, many leakage-resilient schemes have been published. These schemes guarantee security against side-channel attacks given bounded leakage of the underlying primitive.  ...  In this work, we present a novel approach to find reliable leakage bounds for side channels of cryptographic implementations when the input data complexity is limited such as in leakage-resilient schemes  ...  The authors of Isap state concrete leakage bounds for their re-keying function and encryption scheme to still provide 128-bit security. We thus evaluated Eq. 15 on  ... 
doi:10.1007/978-3-319-75208-2_6 fatcat:xndkl7367ffgbprnqjoj62vgkq

Masking against Side-Channel Attacks: A Formal Security Proof [chapter]

Emmanuel Prouff, Matthieu Rivain
2013 Lecture Notes in Computer Science  
Although widely used in practice, masking is often considered as an empirical solution and its effectiveness is rarely proved.  ...  The principle is to randomly split every sensitive intermediate variable occurring in the computation into d + 1 shares, where d is called the masking order and plays the role of a security parameter.  ...  's result demonstrates the soundness of using masking under a practically relevant leakage model.  ... 
doi:10.1007/978-3-642-38348-9_9 fatcat:tkypskwmyzesxfp62xpw2dtf2q

A Leakage Resilient MAC [chapter]

Daniel P. Martin, Elisabeth Oswald, Martijn Stam, Marcin Wójcik
2015 Lecture Notes in Computer Science  
Within the context of continuous leakage, we introduce a novel modular proof technique: while most previous schemes are proven secure directly in the face of leakage, we reduce the (leakage) security of  ...  our scheme to its non-leakage security.  ...  our Scheme In this section we focus on some practical considerations: how efficient is it in comparison to other leakage resilient MAC constructions, and what would a practical implementation need to  ... 
doi:10.1007/978-3-319-27239-9_18 fatcat:ossr3onblzgplpfun7nlvnugiq

On Efficient and Secure Code-based Masking: A Pragmatic Evaluation

Qianmei Wu, Wei Cheng, Sylvain Guilley, Fan Zhang, Wei Fu
2022 Transactions on Cryptographic Hardware and Embedded Systems  
By leveraging both leakage assessment tool and side-channel attacks, we verify the existence of "security order amplification" in practice and validate the reliability of the leakage quantification method  ...  Code-based masking is a highly generalized type of masking schemes, which can be instantiated into specific cases by assigning different encoders.  ...  Besides, the authors acknowledge financial support of the French national bank (BPI) under Securyzr-V grant (Contract n • DOS0144216/00), a RISC-V centric platform integrating security co-processors.  ... 
doi:10.46586/tches.v2022.i3.192-222 fatcat:mdbtgyjxg5dijbmoppk33zqrve

Physical Protection of Lattice-Based Cryptography

Ayesha Khalid, Tobias Oder, Felipe Valencia, Maire O' Neill, Tim Güneysu, Francesco Regazzoni
2018 Proceedings of the 2018 on Great Lakes Symposium on VLSI - GLSVLSI '18  
Although the weaknesses exposed have led to countermeasures for these schemes, the cost, practicality and effectiveness of these on multiple implementation platforms, however, remains under-studied.  ...  The impending realization of scalable quantum computers will have a significant impact on today's security infrastructure.  ...  While LBC constructions provide security guarantees in theory, to date, the investigation of LBC implementations resilient to physical attacks remains understudied.  ... 
doi:10.1145/3194554.3194616 dblp:conf/glvlsi/KhalidOVOGR18 fatcat:lfintj5vbbf5xllxwoxeer6hdu

Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives

Thomas Unterluggauer, Mario Werner, Stefan Mangard
2017 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17  
Meas is applicable to all kinds of memory, e.g., NVM and RAM, and has memory overhead comparable to existing memory authentication techniques without DPA protection, e.g., 7.3% for a block size fitting  ...  Meas prevents higher-order DPA without changes to the cipher implementation by using masking of the plaintext values.  ...  The research leading to these results has received funding from the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement No 681402)  ... 
doi:10.1145/3052973.3052985 dblp:conf/ccs/UnterluggauerWM17 fatcat:7qikovab6rafffoojmvxe5t7xa

New approach to practical leakage-resilient public-key cryptography

Suvradip Chakraborty, Janaka Alawatugoda, Chandrasekaran Pandu Rangan
2019 Journal of Mathematical Cryptology  
We present a new approach to construct several leakage-resilient cryptographic primitives, including leakage-resilient public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and  ...  We introduce the first-ever leakage model for LLKE protocols in the BML setting and the first construction of such a leakage-resilient LLKE from the LR-NIKE protocol.  ...  s framework [8] with a (bounded) leakage-resilient NIKE and a (bounded) leakage-resilient signature scheme.  ... 
doi:10.1515/jmc-2019-0014 fatcat:3q7qeb45pfaqjizpzdlhcemf2q

On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes [chapter]

Guangjun Fan, Yongbin Zhou, François-Xavier Standaert, Dengguo Feng
2015 Lecture Notes in Computer Science  
Nonetheless, for the same scheme instantiated over arbitrary groups of prime order p (denoted EG * ), no leakage resilience bound is given, and was only conjectured to be leakage resilient.  ...  At Asiacrypt 2010, E.Kiltz et al. [1] presented a multiplicatively blinded version of ElGamal public-key encryption scheme, which is proved to be leakage resilient in the generic group model against roughly  ...  So even from more practical point of view, working at higher abstraction level seems appealing. The scheme BEG * in [1] is leakage resilient in generic group model.  ... 
doi:10.1007/978-3-319-17533-1_32 fatcat:6o7tkk2aqzbj7ffcfcw654igmm

Simulatable Leakage: Analysis, Pitfalls, and New Constructions [chapter]

Jake Longo, Daniel P. Martin, Elisabeth Oswald, Daniel Page, Martijin Stam, Michael J. Tunstall
2014 Lecture Notes in Computer Science  
In 2013, Standaert et al. proposed the notion of simulatable leakage to connect theoretical leakage resilience with the practice of side channel attacks.  ...  Using a concrete, block cipher based leakage resilient PRG and high-level simulator definition (based on concatenating two partial leakage traces), they included detailed reasoning why said simulator (  ...  Jake Longo Galea has been supported in part by a studentship under the EPSRC Doctoral Training Partnership (DTP) scheme.  ... 
doi:10.1007/978-3-662-45611-8_12 fatcat:izik4c4c4bhdxkugjfb7ci3azq

Implementation of a leakage-resilient ElGamal key encapsulation mechanism

David Galindo, Johann Großschädl, Zhe Liu, Praveen Kumar Vadnala, Srinivas Vivek
2016 Journal of Cryptographic Engineering  
Currently, a huge gap exists between the theory of such designs and their implementation to confirm the leakage resilience in practice.  ...  Our first contribution is a variant of the bounded leakage and the only-computation-leaks model that is closer to practice.  ...  Two paths are taken to explore the possible solutions, a destructive one and a constructive one. In the first path, we find the rich contributions of the practice and theory of side-channel attacks.  ... 
doi:10.1007/s13389-016-0121-x fatcat:vz3ape7ydvadvdrn2iuqkdkxly
« Previous Showing results 1 — 15 out of 1,465 results