You are looking at a specific version 20200218:091214 of this paper. See the latest version.

Paper 2020/200

Exploring the Golden Mean Between Leakage and Fault Resilience and Practice

Christoph Dobraunig and Bart Mennink and Robert Primas

Abstract

The area of leakage resilient cryptography aims to provide proofs under the assumption that the side channel leakage of implementations behaves in a certain way, e.g., the leakage is bounded, hard-to-invert, or simulatable. On the other hand, it is often hard to show that a practical implementation has such a behavior. Moreover, these models are typically targeted exclusively towards side channel attacks and hence, other implementation attacks like fault attacks are excluded. In this paper, we provide an alternative approach that we call accumulated leakage. In our model, no a priori restriction or assumption on the leakage is made. Instead, leakage resilience bounds are expressed in terms of an accumulated gain, which is a function of the leakage obtained by an attacker. In particular, we express the accumulated gain as a function of the number of computations of a primitive using a secret that an attacker can observe, one of the major restrictions that determines whether a certain implementation attack is possible or not. Having the advantage of a scheme expressed with the help of accumulated leakage, we have two roads to go. One option is to stick to the a priori bounding made in, e.g., the bounded leakage model and put an a priori restriction on the maximum allowed leakage per primitive call. Another option is to compute the accumulated gain based on measurements a posteriori. As a proof of concept, we apply the accumulated leakage concept to a sponge-based stream encryption scheme called asakey: first, a formal leakage resilience analysis is delivered as a function of the accumulated gain, and second, leakage measurements on permutations are performed to demonstrate how the accumulated gain can be estimated a posteriori.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
leakage resilienceaccumulated leakagesponge-based encryptionside channel measurementsfault attackssymmetric cryptography
Contact author(s)
christoph @ dobraunig com
b mennink @ cs ru nl
rprimas @ gmail com
History
2022-10-03: last of 2 revisions
2020-02-18: received
See all versions
Short URL
https://ia.cr/2020/200
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.