Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions

2Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Authenticity can be compromised by information leaked via side-channels (e.g., power consumption). Examples of attacks include direct key recoveries and attacks against the tag verification which may lead to forgeries. At FSE 2018, Berti et al. described two authenticated encryption schemes which provide authenticity assuming a leak-free implementation of a Tweakable Block Cipher. Precisely, security is guaranteed even if all the intermediate computations of the target implementation are leaked in full but the long-term key. Yet, while a leak-free implementation reasonably models strongly protected implementations of a, it remains an idealized physical assumption that may be too demanding in many cases, in particular if hardware engineers mitigate the leakage to a good extent but (due to performance constraints) do not reach leak-freeness. In this paper, we get rid of this important limitation by introducing the notion of Strong Unpredictability with Leakage for and. It captures the hardness for an adversary to provide a fresh and valid input/output pair for a, even having oracle access to the, its inverse and their leakages. This definition is game-based and may be verified/falsified by laboratories. Based on it, we then provide two Message Authentication Codes which are secure if the on which they rely are implemented in a way that maintains a sufficient unpredictability. Thus, we improve the theoretical foundations of leakage-resilient and extend them towards engineering constraints that are easier to achieve in practice. (The full version of this paper is available on ePrint [8].).

Cite

CITATION STYLE

APA

Berti, F., Guo, C., Pereira, O., Peters, T., & Standaert, F. X. (2020). Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 12020 LNCS, pp. 517–532). Springer. https://doi.org/10.1007/978-3-030-42921-8_31

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free