Paper 2010/015

Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?

Jorge Guajardo and Bart Mennink

Abstract

Based on re-keying techniques by Abdalla, Bellare, and Borst [1,2], we consider two black-box secure block cipher based symmetric encryption schemes, which we prove secure in the physically observable cryptography model. They are proven side-channel secure against a strong type of adversary that can adaptively choose the leakage function as long as the leaked information is bounded. It turns out that our simple construction is side-channel secure against all types of attacks that satisfy some reasonable assumptions. In particular, the security turns out to be negligible in the block cipher’s block size n, for all attacks. We also show that our ideas result in an interesting alternative to the implementation of block ciphers using different logic styles or masking countermeasures.

Note: Preliminary version presented at WISSEC 2009

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Unknown where it was published
Keywords
side-channel resistancesecurity modelre-keying techniquesleakage resistanceblock ciphers
Contact author(s)
jorge guajardo @ philips com
History
2010-01-12: received
Short URL
https://ia.cr/2010/015
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2010/015,
      author = {Jorge Guajardo and Bart Mennink},
      title = {Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?},
      howpublished = {Cryptology {ePrint} Archive, Paper 2010/015},
      year = {2010},
      url = {https://eprint.iacr.org/2010/015}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.