Paper 2013/213

On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes

Guangjun Fan, Yongbin Zhou, F. -X. Standaert, and Dengguo Feng


In real world, in order to transform an abstract and generic cryptographic scheme into actual physical implementation, one usually undergoes two processes: mathematical realization at algorithmic level and physical realization at implementation level. In the former process, the abstract and generic cryptographic scheme is transformed into an exact and specific mathematical scheme, while in the latter process the output of mathematical realization is being transformed into a physical cryptographic module runs as a piece of software, or hardware, or combination of both. In black-box model (i.e. leakage-free setting), a cryptographic scheme can be mathematically realized without affecting its theoretical security as long as the mathematical components meet the required cryptographic properties. However, up to now, no previous work formally show that whether one can mathematically realize a leakage resilient cryptographic scheme in existent ways without affecting its practical security. Our results give a negative answer to this important question by introducing attacks against several kinds of mathematical realization of a practical leakage resilient cryptographic scheme. Our results show that there may exist a big gap between the theoretical tolerance leakage rate and the practical tolerance leakage rate of the same leakage resilient cryptographic scheme if the mathematical components in the mathematical realization are not provably secure in leakage setting. Therefore, on one hand, we suggest that all (practical) leakage resilient cryptographic schemes should at least come with a kind of mathematical realization. Using this kind of mathematical realization, its practical security can be guaranteed. On the other hand, our results inspire cryptographers to design advanced leakage resilient cryptographic schemes whose practical security is independent of the specific details of its mathematical realization.

Available format(s)
Publication info
Preprint. MINOR revision.
Physical AttacksLeakage Resilient CryptographyMathematical RealizationPhysical Realization.
Contact author(s)
guangjunfan @ 163 com
2014-09-26: last of 29 revisions
2013-04-14: received
See all versions
Short URL
Creative Commons Attribution


      author = {Guangjun Fan and Yongbin Zhou and F. -X.  Standaert and Dengguo Feng},
      title = {On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes},
      howpublished = {Cryptology ePrint Archive, Paper 2013/213},
      year = {2013},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.