首页> 外文会议>International Conference on Cryptology and Information Security in Latin America >Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction (Extended Abstract)
【24h】

Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction (Extended Abstract)

机译:使用随机滥用和物理泄漏的经过身份验证的加密:定义,分离结果和第一次施工(扩展摘要)

获取原文

摘要

We propose definitions of authenticated encryption (AE) schemes that offer security guarantees even in the presence of nonce misuse and side-channel information leakage. This is part of an important ongoing effort to make AE more robust, while preserving appealing efficiency properties. Our definitions consider an adversary enhanced with the leakage of all the computations of an AE scheme, together with the possibility to misuse nonces, be it during all queries (in the spirit of misuse-resistance), or only during training queries (in the spirit of misuse-resilience recently introduced by Ashur et af). These new definitions offer various insights on the effect of leakage in the security landscape. In particular, we show that, in contrast with the black-box setting, leaking variants of INT-CTXT and IND-CPA security do not imply a leaking variant IND-CCA security, and that leaking variants of INT-PTXT and IND-CCA do not imply a leaking variant of INT-CTXT. They also bring a useful scale to reason about and analyze the implementation properties of emerging modes of operation with different levels of leakage-resistance, such as proposed in the ongoing NIST lightweight cryptography competition. We finally propose the first instance of mode of operation that satisfies our most demanding definitions.
机译:我们提出了即使在存在随意滥用和侧通道信息泄露的情况下,也提出了认证加密(AE)方案的定义,该方案也提供安全保证。这是一个重要的持续努力,使AE更加强大,同时保持吸引力的效率。我们的定义考虑了对AE方案所有计算的泄漏的对手,以及滥用随机的可能性,在所有查询期间(滥用误用的精神),或者只是在训练查询期间(在精神中最近由ashur et af引入的滥用弹性。这些新定义提供了对安全景观泄漏效果的各种见解。特别是,我们表明,与黑盒设置相比,INT-CTXT和IND-CPA安全性的泄漏变体并不意味着泄漏的变体IND-CCA安全性,以及INT-PTXT和IND-CCA的泄漏变体不要暗示INT-CTXT的泄漏变体。他们还带来了一种有用的规模来推理和分析具有不同泄漏电阻级别的新出现方式的实施特性,例如在正在进行的NIST轻量级密码竞争中提出的。我们最终提出了满足我们最苛刻的定义的第一个操作模式。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号