Cryptographic Hardware and Embedded Systems - CHES 2013
Volume 8086 of the series Lecture Notes in Computer Science pp 471-488
Leakage-Resilient Symmetric Encryption via Re-keying
- Michel AbdallaAffiliated withÉcole Normale Supérieure
- , Sonia BelaïdAffiliated withÉcole Normale SupérieureThales Communications & Security
- , Pierre-Alain FouqueAffiliated withÉcole Normale Supérieure
Abstract
In the paper, we study whether it is possible to construct an efficient leakage-resilient symmetric scheme using the AES block cipher. We aim at bridging the gap between the theoretical leakage-resilient symmetric primitives used to build encryption schemes and the practical schemes that do not have any security proof against side-channel adversaries. Our goal is to construct an as efficient as possible leakage-resilient encryption scheme, but we do not want to change the cryptographic schemes already implemented. The basic idea consists in adding a leakage-resilient re-keying scheme on top of the encryption scheme and has been already suggested by Kocher to thwart differential power analysis techniques. Indeed, in such analysis, the adversary queries the encryption box and from the knowledge of the plaintext/ciphertext, she can perform a divide-and-conquer key recovery attack. The method consisting in changing the key for each or after a small number of encryption with the same key is known as re-keying. It prevents DPA adversaries but not SPA attacks which uses one single leakage trace. Here, we prove that using a leakage-resilient re-keying scheme on top of a secure encryption scheme in the standard model, leads to a leakage-resilient encryption scheme. The main advantage of the AES block cipher is that its implementations are generally heuristically-secure against SPA adversaries. This assumption is used in many concrete instantiations of leakage-resilient symmetric primitives. Consequently, if we use it and change the key for each new message block, the adversary will not be able to recover any key if the re-keying scheme is leakage-resilient. There is mainly two different techniques for re-keying scheme, either parallel or sequential, but if we want to avoid the adversary having access to many inputs/outputs, only the sequential method is possible. However, the main drawback of the latter technique is that in case of de-synchronization, many useless computations are required. In our re-keying scheme, we use ideas from the skip-list data structure to efficiently recover a specific key.
Keywords
leakage-resilience symmetric encryption re-keying synchronization- Title
- Leakage-Resilient Symmetric Encryption via Re-keying
- Book Title
- Cryptographic Hardware and Embedded Systems - CHES 2013
- Book Subtitle
- 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings
- Pages
- pp 471-488
- Copyright
- 2013
- DOI
- 10.1007/978-3-642-40349-1_27
- Print ISBN
- 978-3-642-40348-4
- Online ISBN
- 978-3-642-40349-1
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- 8086
- Series ISSN
- 0302-9743
- Publisher
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Topics
- Keywords
-
- leakage-resilience
- symmetric encryption
- re-keying
- synchronization
- Industry Sectors
- eBook Packages
- Editors
-
-
Guido Bertoni
(16)
-
Jean-Sébastien Coron
(17)
-
Guido Bertoni
- Editor Affiliations
-
- 16. STMicroelectronics
- 17. University of Luxembourg
- Authors
-
-
Michel Abdalla
(18)
-
Sonia Belaïd
(18)
(19)
- Pierre-Alain Fouque (18)
-
Michel Abdalla
- Author Affiliations
-
- 18. École Normale Supérieure, 45 rue d’Ulm, 75005, Paris, France
- 19. Thales Communications & Security, 4 Avenue des Louvresses, 92230, Gennevilliers, France
Continue reading...
To view the rest of this content please follow the download PDF link above.