Projects per year
Abstract
Side-channel attacks are a threat to secrets stored on a device, especially if an adversary has physical access to the device. As an effect of this, countermeasures against such attacks for cryptographic algorithms are a well-researched topic. In this work, we deviate from the study of cryptographic algorithms and instead focus on the side-channel protection of a much more basic operation, the comparison of a known attacker-controlled value with a secret one. Comparisons sensitive to side-channel leakage occur in tag comparisons during the verification of message authentication codes (MACs) or authenticated encryption, but are typically omitted in security analyses. Besides, also comparisons performed as part of fault countermeasures might be sensitive to side-channel attacks. In this work, we present a formal analysis on comparing values in a leakage resilient manner by utilizing cryptographic building blocks that are typically part of an implementation anyway. Our results indicate that there is no need to invest additional resources into implementing a protected comparison operation itself if a sufficiently protected implementation of a public cryptographic permutation, or a (tweakable) block cipher, is already available. We complement our contribution by applying our findings to the SuKS message authentication code used by lightweight authenticated encryption scheme ISAP, and to the classical Hash-then-PRF construction.
Original language | English |
---|---|
Title of host publication | Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings |
Editors | Anne Canteaut, François-Xavier Standaert |
Place of Publication | Cham |
Publisher | Springer |
Pages | 377-407 |
Number of pages | 31 |
Volume | 2 |
ISBN (Electronic) | 978-3-030-77886-6 |
ISBN (Print) | 978-3-030-77885-9 |
DOIs | |
Publication status | Published - 2021 |
Event | Eurocrypt 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques - Zagreb, Croatia Duration: 17 Oct 2021 → 21 Oct 2021 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 12697 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | Eurocrypt 2021 |
---|---|
Country/Territory | Croatia |
City | Zagreb |
Period | 17/10/21 → 21/10/21 |
Keywords
- Leakage resilience
- Tag verification
- Value comparison
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science
Fingerprint
Dive into the research topics of 'Leakage Resilient Value Comparison With Application to Message Authentication'. Together they form a unique fingerprint.Projects
- 2 Finished
-
FWF - Authenticated Encryption - Advancing in Authenticated Encryption
Dobraunig, C. E.
3/02/20 → 31/08/20
Project: Research project
-