Paper 2019/1413

Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions

Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, and François-Xavier Standaert


Authenticity can be compromised by information leaked via side-channels (e.g., power consumption). Examples of attacks include direct key recoveries and attacks against the tag verification which may lead to forgeries. At FSE 2018, Berti et al. described two authenticated encryption schemes which provide authenticity assuming a “leak-free implementation” of a Tweakable Block Cipher (TBC). Precisely, security is guaranteed even if all the intermediate computations of the target implementation are leaked in full but the TBC long-term key. Yet, while a leak-free implementation reasonably models strongly protected implementations of a TBC, it remains an idealized physical assumption that may be too demanding in many cases, in particular, if hardware engineers mitigate the leakage to a good extent but (due to performance constraints) do not reach leak-freeness. In this paper, we get rid of this important limitation by introducing the notion of “Strong Unpredictability with Leakage” for BC's and TBC's. It captures the hardness for an adversary to provide a fresh and valid input/output pair for a (T)BC, even having oracle access to the (T)BC, its inverse and their leakages. This definition is game-based and may be verified/falsified by laboratories. Based on it, we then provide two Message Authentication Codes (MAC) which are secure if the (T)BC on which they rely are implemented in a way that maintains a sufficient unpredictability. Thus, we improve the theoretical foundations of leakage-resilient MAC and extend them towards engineering constraints that are easier to achieve in practice.

Available format(s)
Secret-key cryptography
Publication info
Published elsewhere. MINOR revision.Inscrypt 2019
Leakage-resilient MACtweakable block cipherunpredictability
Contact author(s)
thomas peters @ uclouvain be
2019-12-06: received
Short URL
Creative Commons Attribution


      author = {Francesco Berti and Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert},
      title = {Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions},
      howpublished = {Cryptology ePrint Archive, Paper 2019/1413},
      year = {2019},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.