首页> 外文期刊>Journal of cryptographic engineering >Extractors against side-channel attacks: weak or strong?
【24h】

Extractors against side-channel attacks: weak or strong?

机译:防止旁通道攻击的提取器:弱还是强?

获取原文
获取原文并翻译 | 示例
           

摘要

Randomness extractors are important tools in cryptography. Their goal is to compress a high-entropy source into a more uniform output. Beyond their theoretical interest, they have recently gained attention because of their use in the design and proof of leakage-resilient primitives, such as stream ciphers and pseudorandom functions. However, for these proofs of leakage resilience to be meaningful in practice, it is important to instantiate and implement the components they are based on. In this context, while numerous works have investigated the implementation properties of block ciphers such as the AES Rijndael, very little is known about the application of side-channel attacks against extractor implementations. In order to close this gap, this paper instantiates a low-cost hardware extractor and analyzes it both from a performance and from a side-channel security point of view. Our investigations lead to contrasted conclusions. On one hand, extractors can be efficiently implemented and protected with masking. On the other hand, they provide adversaries with many more exploitable leakage samples than, e.g. block ciphers. As a result, they can ensure high security margins against standard (non-profiled) side-channel attacks and turn out to be much weaker against profiled attacks. From a methodological point of view, our analysis consequently raises the question of which attack strategies should be considered in security evaluations.
机译:随机性提取器是密码学中的重要工具。他们的目标是将高熵源压缩为更均匀的输出。除了他们的理论兴趣之外,由于它们在设计和证明防漏原语(例如流密码和伪随机函数)中的用途,最近也引起了人们的关注。但是,为使这些泄漏弹性证明在实践中有意义,重要的是实例化并实现它们所基于的组件。在这种情况下,尽管许多工作已经研究了诸如AES Rijndael之类的分组密码的实现特性,但对于提取器实现的边信道攻击的应用知之甚少。为了弥合这一差距,本文实例化了一种低成本的硬件提取器,并从性能和侧通道安全性的角度对其进行了分析。我们的研究得出相反的结论。一方面,提取器可以通过掩膜有效地实现和保护。另一方面,他们为对手提供的漏洞样本比例如分组密码。结果,它们可以确保抵御标准(非配置文件)侧信道攻击的安全性高,而抵御配置文件攻击的安全性要弱得多。从方法论的角度来看,我们的分析因此提出了在安全评估中应考虑哪种攻击策略的问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号