Paper 2020/280

Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions

Juliane Krämer and Patrick Struck

Abstract

In this work we study the leakage resilience of authenticated encryption schemes. We show that, if one settles for non-adaptive leakage, leakage-resilient authenticated encryption schemes can be built solely from leakage-resilient pseudorandom functions. Degabriele et al. (ASIACRYPT 2019) introduce the FGHF' construction which allows to build leakage-resilient authenticated encryption schemes from functions which, under leakage, retain both pseudorandomness and unpredictability. We revisit their construction and show the following. First, pseudorandomness and unpredictability do not imply one another in the leakage setting. Unfortunately, this entails that any instantiation of the FGHF' construction indeed seems to require a function that is proven both pseudorandom and unpredictable under leakage. Second, however, we show that the unpredictability requirement is an artefact that stems from the underlying composition theorem of the N2 construction given by Barwell et al. (ASIACRYPT 2017). By recasting this composition theorem, we show that the unpredictability requirement is unnecessary for the FGHF' construction. Thus, leakage-resilient AEAD schemes can be obtained by instantiating the FGHF' construction with functions that are solely pseudorandom under leakage.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. MINOR revision.11th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2020)
Keywords
AEADLeakage ResilienceSide ChannelsFGHF'
Contact author(s)
patrick @ qpc tu-darmstadt de
History
2020-07-17: revised
2020-03-04: received
See all versions
Short URL
https://ia.cr/2020/280
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/280,
      author = {Juliane Krämer and Patrick Struck},
      title = {Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions},
      howpublished = {Cryptology ePrint Archive, Paper 2020/280},
      year = {2020},
      note = {\url{https://eprint.iacr.org/2020/280}},
      url = {https://eprint.iacr.org/2020/280}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.