Paper 2020/280
Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
Juliane Krämer and Patrick Struck
Abstract
In this work we study the leakage resilience of authenticated encryption schemes. We show that, if one settles for non-adaptive leakage, leakage-resilient authenticated encryption schemes can be built solely from leakage-resilient pseudorandom functions. Degabriele et al. (ASIACRYPT 2019) introduce the FGHF' construction which allows to build leakage-resilient authenticated encryption schemes from functions which, under leakage, retain both pseudorandomness and unpredictability. We revisit their construction and show the following. First, pseudorandomness and unpredictability do not imply one another in the leakage setting. Unfortunately, this entails that any instantiation of the FGHF' construction indeed seems to require a function that is proven both pseudorandom and unpredictable under leakage. Second, however, we show that the unpredictability requirement is an artefact that stems from the underlying composition theorem of the N2 construction given by Barwell et al. (ASIACRYPT 2017). By recasting this composition theorem, we show that the unpredictability requirement is unnecessary for the FGHF' construction. Thus, leakage-resilient AEAD schemes can be obtained by instantiating the FGHF' construction with functions that are solely pseudorandom under leakage.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. Minor revision. 11th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2020)
- Keywords
- AEADLeakage ResilienceSide ChannelsFGHF'
- Contact author(s)
- patrick @ qpc tu-darmstadt de
- History
- 2020-07-17: revised
- 2020-03-04: received
- See all versions
- Short URL
- https://ia.cr/2020/280
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2020/280, author = {Juliane Krämer and Patrick Struck}, title = {Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions}, howpublished = {Cryptology {ePrint} Archive, Paper 2020/280}, year = {2020}, url = {https://eprint.iacr.org/2020/280} }