Paper 2012/114

On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives

Danyang Chen, Yongbin Zhou, Yang Han, Rui Xue, and Qing He

Abstract

Random extractors are proven to be important building blocks in constructing leakage resilient cryptographic primitives. Nevertheless, recent efforts showed that they are likely more leaky than other elementary components (e.g. block ciphers) in unprotected implementations of these primitives, in the context of side-channel attacks. In this context, from the adversary's point of view, the extractors themselves could become the point of interest. This paper extends the problem of how leakage resilience of random extractors could be to the case of protected instantiations. Specifically, we investigate the feasibility of applying classical countermeasures to ameliorate leakage resilience of cryptographic components and/or primitives against side-channel attacks, and then show how to evaluate the physical leakage resilience of these instantiations theoretically and practically. The countermeasures we consider are masking, shuffling, and combination of them. Taking one leakage-resilient stream cipher presented at FOCS 2008 as a case of study, we not only examine the leakage resilience of the underlying extractor, but also discuss how leakages from the extractor and from the underlying pseudo-random generator respectively impact the leakage resilience of the stream cipher as a whole. On the one hand, our theoretical and experimental results, which are consistent with each other, do justify some existing observations. On the other hand, and more importantly, our results reveal some new observations that contrast with these knowing ones, which explicitly indicates that previous observations are (mostly likely) incomplete. We argue that our work is of both obvious theoretical interest and important practical significance, and may help foster the further research on the design and implementation of random extractors in leakage-resilient cryptography.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Original Work Published Nowhere Else
Keywords
Side-Channel AttacksRandom ExtractorCryptographic InstantiationsLeakage ResilienceMasking and Shuffling
Contact author(s)
zhouyongbin @ iie ac cn
History
2012-03-04: received
Short URL
https://ia.cr/2012/114
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/114,
      author = {Danyang Chen and Yongbin Zhou and Yang Han and Rui Xue and Qing He},
      title = {On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives},
      howpublished = {Cryptology ePrint Archive, Paper 2012/114},
      year = {2012},
      note = {\url{https://eprint.iacr.org/2012/114}},
      url = {https://eprint.iacr.org/2012/114}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.