Paper 2013/797

Tamper Resilient Circuits: The Adversary at the Gates

Aggelos Kiayias and Yiannis Tselekounis

Abstract

We initiate the investigation of {\em gate}-tampering attacks against cryptographic circuits. Our model is motivated by the plausibility of tampering directly with circuit gates and by the increasing use of {\em tamper resilient gates} among the known constructions that are shown to be resilient against {\em wire-tampering} adversaries. We prove that gate-tampering is {\em strictly} stronger than wire-tampering. On the one hand, we show that there is a gate-tampering strategy that perfectly simulates any given wire-tampering strategy. On the other, we construct families of circuits over which it is impossible for any wire-tampering attacker to simulate a certain gate-tampering attack (that we explicitly construct). We also provide a tamper resilience impossibility result that applies to both gate and wire tampering adversaries and relates the amount of tampering to the depth of the circuit. Finally, we show that defending against gate-tampering attacks is feasible by appropriately abstracting and analyzing the circuit compiler of Ishai et al. \cite{Ishai:2006a} in a manner which may be of independent interest. Specifically, we first introduce a class of compilers that, assuming certain well defined tamper resilience characteristics against a specific class of attackers, can be shown to produce tamper resilient circuits against that same class of attackers. Then, we describe a compiler in this class for which we prove that it possesses the necessary tamper-resilience characteristics against gate-tampering attackers.

Metadata
Available format(s)
PDF
Publication info
A minor revision of an IACR publication in ASIACRYPT 2013
Keywords
tamper resilient circuitsattack modeling
Contact author(s)
tselekounis @ sians org
History
2013-12-01: received
Short URL
https://ia.cr/2013/797
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2013/797,
      author = {Aggelos Kiayias and Yiannis Tselekounis},
      title = {Tamper Resilient Circuits: The Adversary at the Gates},
      howpublished = {Cryptology {ePrint} Archive, Paper 2013/797},
      year = {2013},
      url = {https://eprint.iacr.org/2013/797}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.