Artykuł w czasopiśmie
Brak miniatury
Licencja

ClosedAccessDostęp zamknięty
 

Unifying Leakage Models: From Probing Attacks to Noisy Leakage

Uproszczony widok
dc.abstract.enA recent trend in cryptography is to formally show the leakage resilience of cryptographic implementations in a given leakage model. One of the most prominent leakage model—the so-called bounded leakage model—assumes that the amount of leakage that an adversary receives is a-priori bounded. Unfortunately, it has been pointed out by several works that the assumption of bounded leakages is hard to verify in practice. A more realistic assumption is to consider that leakages are sufficiently noisy, following the engineering observation that real-world physical leakages are inherently perturbed by physical noise. While already the seminal work of Chari et al. (in: CRYPTO, pp 398–412, 1999) study security of side-channel countermeasures in the noisy model, only recently Prouff and Rivain (in: Johansson T, Nguyen PQ (eds) EUROCRYPT, volume 7881 of lecture notes in 931 computer science, pp 142–159, Springer, 2013) offer a full formal analysis of the masking countermeasure in a physically motivated noise model. In particular, the authors show that a block-cipher implementation that uses the Boolean masking scheme is secure against a very general class of noisy leakage functions. While this is an important step toward better understanding the security of masking schemes, the analysis of Prouff and Rivain has several shortcomings including in particular requiring leak-free gates. In this work, we provide an alternative security proof in the same noise model that overcomes these challenges. We achieve this goal by a new reduction from noisy leakage to the important model of probing adversaries (Ishai et al. in: CRYPTO, pp 463–481, 2003). This reduction is the main technical contribution of our work that significantly simplifies the formal security analysis of masking schemes against realistic side-channel leakages.
dc.affiliationUniwersytet Warszawski
dc.contributor.authorDziembowski, Stefan
dc.contributor.authorFaust, Sebastian
dc.contributor.authorDuc, Alexandre
dc.date.accessioned2024-01-26T11:19:28Z
dc.date.available2024-01-26T11:19:28Z
dc.date.issued2019
dc.description.financeNie dotyczy
dc.description.number1
dc.description.volume32
dc.identifier.doi10.1007/S00145-018-9284-1
dc.identifier.issn0933-2790
dc.identifier.urihttps://repozytorium.uw.edu.pl//handle/item/124205
dc.identifier.weblinkhttp://link.springer.com/article/10.1007/s00145-018-9284-1/fulltext.html
dc.languageeng
dc.pbn.affiliationcomputer and information sciences
dc.relation.ispartofJournal of Cryptology
dc.relation.pages151-177
dc.rightsClosedAccess
dc.sciencecloudnosend
dc.subject.enLeakage-resilient cryptography
dc.subject.enNoisy leakage
dc.subject.enProbing attacks
dc.titleUnifying Leakage Models: From Probing Attacks to Noisy Leakage
dc.typeJournalArticle
dspace.entity.typePublication