首页> 外文会议>International Conference on the Theory and Application of Cryptology and Information Security >Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF
【24h】

Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF

机译:并行设置中未知输入攻击:提高CHES 2012泄漏弹性PRF的安全性

获取原文

摘要

In this work we present a leakage-resilient PRF which makes use of parallel block cipher implementations with unknown-inputs. To the best of our knowledge this is the first work to study and exploit unknown-inputs as a form of key-dependent algorithmic noise. It turns out that such noise renders the problem of side-channel key recovery intractable under very little and easily satisfiable assumptions. That is, the construction stays secure even in a noise-free setting and independent of the number of traces and the used power model. The contributions of this paper are as follows. First, we present a PRF construction which offers attractive security properties, even when instantiated with the AES. Second, we study the effect of unknown-input attacks in parallel implementations. We put forward their intractability and explain it by studying the inevitable model errors obtained when building templates in such a scenario. Third, we compare the security of our construction to the CHES 2012 one and show that it is superior in many ways. That is, a standard block cipher can be used, the security holds for all intermediate variables and it can even partially tolerate local EM attacks and some typical implementation mistakes or hardware insufficiencies. Finally, we discuss the performance of a standard-cell implementation.
机译:在这项工作中,我们呈现了一种漏益弹性PRF,它利用具有未知输入的并行块密码实现。据我们所知,这是第一个学习和利用未知输入的工作作为关键相关算法噪声的形式。事实证明,这种噪音使侧通道钥匙恢复的问题擅自在非常少且易于满足的假设下棘手。也就是说,即使在无噪声设置中也保持安全保持安全,并且独立于迹线的数量和二手电力模型。本文的贡献如下。首先,我们介绍了一个PRF结构,它即使在与AES实例化的情况下也提供有吸引力的安全性。其次,我们研究了并行实现中未知输入攻击的影响。我们通过研究在这种情况下构建模板时获得的不可避免的模型错误来提出富侵害性并解释它。第三,我们将我们建筑的安全性与Ches 2012进行比较,并表明它在很多方面都是优越的。也就是说,可以使用标准块密码,对所有中间变量保持安全性,它甚至可以部分地容忍本地EM攻击以及一些典型的实施错误或硬件不足。最后,我们讨论了标准单元实施的性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号