Leakage-Resilient Cryptography in the Standard Model
Stefan Dziembowski and Krzysztof Pietrzak
Abstract
We construct a stream-cipher whose \emph{implementation} is
secure even if arbitrary (adversely chosen) information on the
internal state of is leaked during computation. This captures
\emph{all} possible side-channel attacks on where the amount
of information leaked in a given period is bounded, but overall can
be arbitrary large, in particular much larger than the internal
state of . The only other assumption we make on the
\emph{implementation} of is that only data that is accessed
during computation leaks information.
The construction can be based on any pseudorandom generator, and the
only computational assumption we make is that this PRG is secure
against non-uniform adversaries in the classical
sense (i.e. when there are no side-channels).
The stream-cipher generates its output in chunks
, and arbitrary but bounded information leakage is
modeled by allowing the adversary to adaptively chose a function
before is computed,
she then gets where is the internal
state of that is accessed during the computation of
.
One notion of security we prove for is that
is indistinguishable from random when given ,
and also the complete
internal state of after has been computed
(i.e. our cipher is forward-secure).
The construction is based on alternating extraction (previously
used in the intrusion-resilient secret-sharing scheme from
FOCS'07). We move this concept to the computational setting by
proving a lemma that states that the output of any PRG has high HILL
pseudoentropy (i.e. is indistinguishable from some distribution with
high min-entropy) even if arbitrary information about the seed is
leaked. The amount of leakage that we can tolerate in each
step depends on the strength of the underlying PRG, it is at least
logarithmic, but can be as large as a constant fraction of the
internal state of if the PRG is exponentially hard.
@misc{cryptoeprint:2008/240,
author = {Stefan Dziembowski and Krzysztof Pietrzak},
title = {Leakage-Resilient Cryptography in the Standard Model},
howpublished = {Cryptology {ePrint} Archive, Paper 2008/240},
year = {2008},
url = {https://eprint.iacr.org/2008/240}
}
Note: In order to protect the privacy of readers, eprint.iacr.org
does not use cookies or embedded third party content.