An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security

  • Wei Li
  • Dawu Gu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4784)

Abstract

This paper defines perfect security against side channel attacks for a cryptosystem implementation, and discusses the implication of secure notions for a cryptosystem in provable security. Then we give some security notions for symmetric encryption against side channel attacks, UB-SCA (unbreakability in side channel attacks) and IND-CPA-SCA (indistinguishability of chosen plaintext attacks and side channel attacks). On the basis of these definitions, we propose and prove that IND-CPA + UB-SCA \(\Rightarrow\) IND-CPA-SCA by reduction, and IND-CPA-SCA is stronger than IND-CPA or UB-SCA.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Hess, E., Janssen, N., Meyer, B., Schütze, T.: Information Leakage Attacks Against Smart Card Implementations of Cryptographic Algorithms and Countermeasures–A Survey. In: Proceedings of EUROSMART Security Conference (2000)Google Scholar
  2. 2.
    Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)Google Scholar
  3. 3.
    Kocher, P.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)Google Scholar
  4. 4.
    Kelsey, J., Schneier, B., Wagner, D., Hall, C.: Side Channel Cryptanalysis of Product Ciphers. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 97–110. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  5. 5.
    Micali, S., Reyzin, L.: Physically Observable Cryptography, Cryptology ePrint Archive of IACR, No. 120 (2003), available at http://eprint.iacr.org/2003/120
  6. 6.
    Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and System Sciences 28(2), 270–299 (1984)MATHCrossRefMathSciNetGoogle Scholar
  7. 7.
    Bellare, M., Desai, A., Jokipii, E.: A concrete security treatment of symmetric encryption. In: FOCS 1997, pp. 394–405. IEEE Press, Los Alamitos (1997)Google Scholar
  8. 8.
    Clavier, C., Joye, M.: Universal Exponentiation Algorithm. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 300–308. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  9. 9.
    Micali, S., Reyzin, L.: Phyiscal observable Cryptography. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 278–296. Springer, Heidelberg (2004)Google Scholar
  10. 10.
    Standaert, F.X., Peeters, E., Archambeau, C., et al.: Towards Security Limits in Side-Channel Attacks. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 30–45. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  11. 11.
    Standaert, F.X., Malkin, T.G., Yung, M.: A Formal Practice-Oriented Model for the Analysis of Side-Channel Attacks. Cryptology ePrint Archive, Report 2006/139  (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Wei Li
    • 1
  • Dawu Gu
    • 1
  1. 1.Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240China

Personalised recommendations