首页> 外文会议>Theory of Cryptography Conference(TCC 2004); 20040219-20040221; Cambridge,MA; US >Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security Against Hardware Tampering
【24h】

Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security Against Hardware Tampering

机译:算法防篡改(ATP)安全性:针对硬件篡改的安全性的理论基础

获取原文
获取原文并翻译 | 示例

摘要

Traditionally, secure cryptographic algorithms provide security against an adversary who has only black-box access to the secret information of honest parties. However, such models are not always adequate. In particular, the security of these algorithms may completely break under (feasible) attacks that tamper with the secret key. In this paper we propose a theoretical framework to investigate the algorithmic aspects related to tamper-proof security. In particular, we define a model of security against an adversary who is allowed to apply arbitrary feasible functions f to the secret key sk, and obtain the result of the cryptographic algorithms using the new secret key f(sk). We prove that in the most general setting it is impossible to achieve this strong notion of security. We then show minimal additions to the model, which are needed in order to obtain provable security. We prove that these additions are necessary and also sufficient for most common cryptographic primitives, such as encryption and signature schemes. We discuss the applications to portable devices protected by PINs and show how to integrate PIN security into the generic security design. Finally we investigate restrictions of the model in which the tampering powers of the adversary are limited. These restrictions model realistic attacks (like differential fault analysis) that have been demonstrated in practice. In these settings we show security solutions that work even without the additions mentioned above.
机译:传统上,安全的密码算法为只有黑盒访问诚实方秘密信息的对手提供安全保护。但是,这样的模型并不总是足够的。特别是,这些算法的安全性可能会完全受到篡改密钥的(可行)攻击的破坏。在本文中,我们提出了一个理论框架来研究与防篡改安全性相关的算法方面。特别地,我们定义了一种针对允许将任意可行函数f应用于秘密密钥sk的对手的安全性模型,并使用新的秘密密钥f(sk)获得密码算法的结果。我们证明,在最一般的情况下,不可能实现这种强大的安全性概念。然后,我们显示了对模型的最少添加,这些添加对于获得可证明的安全性是必需的。我们证明这些添加对于大多数常见的加密原语(例如加密和签名方案)而言是必要且也足够的。我们讨论了受PIN保护的便携式设备的应用程序,并展示了如何将PIN安全性集成到通用安全性设计中。最后,我们研究了模型的限制,在该模型中,对手的篡改能力受到限制。这些限制对实际攻击(如差分故障分析)进行了建模,这些攻击已在实践中得到证明。在这些设置中,我们显示了即使没有上述添加也可以使用的安全解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号