Filters








228 Hits in 5.9 sec

Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks

Boris Köpf, Geoffrey Smith
2010 2010 23rd IEEE Computer Security Foundations Symposium  
We establish formal bounds for the number of min-entropy bits that can be extracted in a timing attack against a cryptosystem that is protected by blinding, the state-of-the art countermeasure against  ...  Compared with existing bounds, our bounds are both tighter and of greater operational significance, in that they directly address the key's one-guess vulnerability.  ...  Geoffrey Smith was partially supported by the National Science Foundation under grant CNS-0831114.  ... 
doi:10.1109/csf.2010.11 dblp:conf/csfw/KopfS10 fatcat:d5bwqnj2mfbujpd2a4gl6asgwu

Physical Protection of Lattice-Based Cryptography

Ayesha Khalid, Tobias Oder, Felipe Valencia, Maire O' Neill, Tim Güneysu, Francesco Regazzoni
2018 Proceedings of the 2018 on Great Lakes Symposium on VLSI - GLSVLSI '18  
We survey the state-of-the-art in terms of side channel attacks (SCA), both invasive and passive attacks, and proposed countermeasures.  ...  Although the weaknesses exposed have led to countermeasures for these schemes, the cost, practicality and effectiveness of these on multiple implementation platforms, however, remains under-studied.  ...  The first work discussing timing attacks on lattice-based cryptography is the one of Silverman and Whyte [40] . They mounted a timing attack an implementation of NTRUEncrypt.  ... 
doi:10.1145/3194554.3194616 dblp:conf/glvlsi/KhalidOVOGR18 fatcat:lfintj5vbbf5xllxwoxeer6hdu

Implementation of a leakage-resilient ElGamal key encapsulation mechanism

David Galindo, Johann Großschädl, Zhe Liu, Praveen Kumar Vadnala, Srinivas Vivek
2016 Journal of Cryptographic Engineering  
Leakage-resilient cryptography aims to extend the rigorous guarantees achieved through the provable security paradigm to physical implementations.  ...  Our first contribution is a variant of the bounded leakage and the only-computation-leaks model that is closer to practice.  ...  Even though they provide provable security against a large class of side-channel attacks, they do so under certain leakage models and leakage bound requirements that are far from what we can ensure in  ... 
doi:10.1007/s13389-016-0121-x fatcat:vz3ape7ydvadvdrn2iuqkdkxly

The Meaning of Attack-Resistant Systems [article]

Vijay Ganesh, Sebastian Banescu, Martín Ochoa
2015 arXiv   pre-print
hard to exploit by certain attackers, usually relying on the strength of the randomness of a probabilistic transformation of the environment or the program and some knowledge on the attacker's goals and  ...  Can we quantify and show that these defense mechanisms provide formal security guarantees, albeit partial, even in the presence of exploitable vulnerabilities?".  ...  Acknowledgements We would like to thank the following people for their contributions and discussions: Michael Carbin, Martin Rinard, Mayank Varia, Michael Stone and Somesh Jha.  ... 
arXiv:1502.04023v3 fatcat:fqpbykjrore5tib655lozlpfaq

Another look at security definitions

Alfred Menezes, Neal Koblitz
2013 Advances in Mathematics of Communications  
We pay particular attention to digital signatures, symmetric-key encryption, and leakage resilience.  ...  Even when definitions have an appealing logical elegance and nicely reflect certain notions of security, they fail to take into account many types of attacks and do not provide a comprehensive model of  ...  In addition, we thank Ann Hibner Koblitz for helpful editorial and stylistic suggestions, and Gustav Claus for providing a model of Bubba's dialect of English.  ... 
doi:10.3934/amc.2013.7.1 fatcat:ajlicvmsivh6rpbjn344sw72ki

Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing

James Park, Wanlei Zhou
2016 Entropy  
and modeling of cyber attacks with Petri Nets, and quantum flows for secret key distribution, etc.  ...  Entropy is a basic and important concept in information theory. It is also often used as a measure of the unpredictability of a cryptographic key in cryptography research areas.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/e18090334 fatcat:vxubyrnfrrhdzgedsufoews4gq

Achieving Leakage Resilience through Dual System Encryption [chapter]

Allison Lewko, Yannis Rouselakis, Brent Waters
2011 Lecture Notes in Computer Science  
We demonstrate this concretely by providing fully secure IBE, HIBE, and ABE systems which are resilient to bounded leakage from each of many secret keys per user, as well as many master keys.  ...  This can be realized as resilience against continual leakage if we assume keys are periodically updated and no (or logarithmic) leakage is allowed during the update process.  ...  Acknowledgments We are thankful to Joël Alwen and Yevgeniy Vahlis for useful observations.  ... 
doi:10.1007/978-3-642-19571-6_6 fatcat:sphqyprquvehjivaet5blzy5ra

Differential power analysis countermeasures for the configuration of SRAM FPGAs

William Luis, G. Richard Newell, Kenneth Alexander
2015 MILCOM 2015 - 2015 IEEE Military Communications Conference  
proposed by Cryptography Research, Inc.  ...  This work further presents data on the effectiveness of the underlying solution using a statistical characterization of side channel leakage using the Test Vector Leakage Assessment (TVLA) methodology  ...  The target uses a leakage resistant mode of decryption and authentication proposed by Cryptography Research Inc. [15] . IV.  ... 
doi:10.1109/milcom.2015.7357621 dblp:conf/milcom/LuisNA15 fatcat:njkkw4lutnd4dleososhpbluc4

Rational Protection against Timing Attacks

Goran Doychev, Boris Kopf
2015 2015 IEEE 28th Computer Security Foundations Symposium  
At the heart of the equilibrium computation are novel bounds for the probability of key recovery, which are expressed as a function of the applied protection and the attack strategy of a timing adversary  ...  One is hence faced with the problem of striking a balance between performance and security against timing attacks.  ...  Acknowledgements: This work was partially funded by Spanish Project TIN2012-39391-C04-01 StrongSoft and Madrid Regional Project S2013/ICE-2731 N-GREENS.  ... 
doi:10.1109/csf.2015.39 dblp:conf/csfw/DoychevK15 fatcat:g2wnnmpqtzhwjnojyjoz6wngbu

A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks and Defenses in Cryptography [article]

Xiaoxuan Lou, Tianwei Zhang, Jun Jiang, Yinqian Zhang
2021 arXiv   pre-print
of side-channel vulnerabilities.  ...  Side-channel attacks have become a severe threat to the confidentiality of computer applications and systems.  ...  Abstract interpretation is a common approach to analyze the source code and measure the information leakage (bounds).  ... 
arXiv:2103.14244v1 fatcat:u35eyivqbngplfa4qrswfsqqti

From A to Z: Projective coordinates leakage in the wild

Alejandro Cabrera Aldaya, Cesar Pereida García, Billy Bob Brumley
2020 Transactions on Cryptographic Hardware and Embedded Systems  
However, this attack has received little attention by the scientific community, and the status of deployed mitigations to prevent it in widely adopted cryptography libraries is unknown.  ...  To demonstrate the applicability of the attack, we use a side-channel attack to exploit this vulnerability within libgcrypt in the context of ECDSA.  ...  This project has received funding from the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement No 804476).  ... 
doi:10.13154/tches.v2020.i3.428-453 dblp:journals/tches/AldayaGB20 fatcat:ooimjadaarbfngl454r2qzva2y

A Leakage Resilient MAC [chapter]

Daniel P. Martin, Elisabeth Oswald, Martijn Stam, Marcin Wójcik
2015 Lecture Notes in Computer Science  
the nonleakage security) and it also means that, if the security of the non-leakage version is improved, the security in the face of leakage is improved 'for free'.  ...  Within the context of continuous leakage, we introduce a novel modular proof technique: while most previous schemes are proven secure directly in the face of leakage, we reduce the (leakage) security of  ...  However the leakage bound is a total bound, i.e. it holds regardless of the number of times the tag and verify algorithms are called.  ... 
doi:10.1007/978-3-319-27239-9_18 fatcat:ossr3onblzgplpfun7nlvnugiq

Enabling Encrypted Cloud Media Center with Secure Deduplication

Yifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, Xiaolin Gui
2015 Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '15  
networks and different devices to ensure the quality of service.  ...  It builds on top of latest advancements on secure deduplication and video coding techniques, with fully functional system implementations on encrypted video deduplication and adaptive video dissemination  ...  Under this setting, CE is not appropriate for use in our system since its data encryption key is not leakage resilient.  ... 
doi:10.1145/2714576.2714628 dblp:conf/ccs/ZhengYWJWG15 fatcat:zt6ouqpjyfh3tejopwpkduyxre

A Survey on Security Mechanisms for NoC-based Many-Core SoCs

Luciano Lores Caimi, Rafael Faccenda, Fernando Gehm Moraes
2021 Journal of Integrated Circuits and Systems  
The literature contains several proposals to protect many-cores against attacks, focusing on the protection of the application execution or the access to shared memories.  ...  This survey concludes with an evaluation of the studied methods, pointing out directions and research opportunities.  ...  ACKNOWLEDGEMENTS This work was financed in part by CNPq (Conselho Nacional de Desenvolvimento Científico e Tecnológico) -grant 309605/2020-2; and CAPES (Coordenação de Aperfeiçoamento de Pessoal de Nível  ... 
doi:10.29292/jics.v16i2.485 fatcat:vc7hgae5arhxvmko2obif4lwl4

Critical perspectives on provable security: Fifteen years of "another look" papers

Neal Koblitz, Alfred Menezes
2019 Advances in Mathematics of Communications  
We give an overview of our critiques of "proofs" of security and a guide to our papers on the subject that have appeared over the past decade and a half.  ...  We also provide numerous additional examples and a few updates and errata. 2010 Mathematics Subject Classification: Primary: 94A60.  ...  for editorial corrections and comments.  ... 
doi:10.3934/amc.2019034 fatcat:gpftyd4hxjebfpzdqwdes345na
« Previous Showing results 1 — 15 out of 228 results