You are looking at a specific version 20170405:101856 of this paper. See the latest version.

Paper 2017/068

Authenticated Encryption in the Face of Protocol and Side Channel Leakage

Guy Barwell and Daniel P. Martin and Elisabeth Oswald and Martijn Stam

Abstract

Authenticated encryption schemes in practice have to be robust against adversaries that have access to various types of leakage, for instance decryption leakage on invalid ciphertexts (protocol leakage), or leakage on the underlying primitives (side channel leakage). This work includes several novel contributions: we augment the notion of nonce-base authenticated encryption with the notion of continuous leakage and we prove composition results in the face of protocol and side channel leakage. Moreover, we show how to achieve authenticated encryption that is simultaneously both misuse resistant and leakage resilient, based on a sufficiently leakage resilient PRF, and finally we propose a concrete, pairing-based, instantiation of the latter.

Note: Improved write-up, with minor structural and technical differences.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
provable securityauthenticated encryptiongeneric compositionleakage resiliencerobustness
Contact author(s)
guy barwell+LAE @ bristol ac uk
History
2017-09-13: last of 3 revisions
2017-01-31: received
See all versions
Short URL
https://ia.cr/2017/068
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.