CryptoDB
Martijn Stam
Publications
Year
Venue
Title
2020
TCHES
Redundant Code-based Masking Revisited
📺
Abstract
Masking schemes are a popular countermeasure against side-channel attacks. To mask bytes, the two classical options are Boolean masking and polynomial masking. The latter lends itself to redundant masking, where leakage emanates from more shares than are strictly necessary to reconstruct, raising the obvious question how well such “redundant” leakage can be exploited by a side-channel adversary. We revisit the recent work by Chabanne et al. (CHES’18) and show that, contrary to their conclusions, said leakage can—in theory—always be exploited. For the Hamming weight scenario in the low-noise regime, we heuristically determine how security degrades in terms of the number of redundant shares for first and second order secure polynomial masking schemes.Furthermore, we leverage a well-established link between linear secret sharing schemes and coding theory to determine when different masking schemes will end up with essentially equivalent leakage profiles. Surprisingly, we conclude that for typical field sizes and security orders, Boolean masking is a special case of polynomial masking. We also identify quasi-Boolean masking schemes as a special class of redundant polynomial masking and point out that the popular “Frobenius-stable” sets of interpolations points typically lead to such quasi-Boolean masking schemes, with subsequent degraded leakage performance.
2017
TOSC
Modes of Operation Suitable for Computing on Encrypted Data
Abstract
We examine how two parallel modes of operation for Authenticated Encryption (namely CTR+PMAC and OTR mode) work when evaluated in a multiparty computation engine. These two modes are selected because they suit the PRFs examined in previous works. In particular the modes are highly parallel, and do not require evaluation of the inverse of the underlying PRF. In order to use these modes one needs to convert them from their original instantiation of being defined on binary blocks of data, to working on elememts in a large prime finite field. The latter fitting the use case of many secret-sharing based MPC engines. In doing this conversion we examine the associated security proofs of PMAC and OTR, and show that they carry over to this new setting.
2017
TOSC
Turning Online Ciphers Off
Abstract
CAESAR has caused a heated discussion regarding the merits of one-pass encryption and online ciphers. The latter is a keyed, length preserving function which outputs ciphertext blocks as soon as the respective plaintext block is available as input. The immediacy of an online cipher affords a clear performance advantage, but it comes at a price: ciphertext blocks cannot depend on later plaintext blocks, limiting diffusion and hence security. We show how one can attain the best of both worlds by providing provably secure constructions, achieving full cipher security, based on applications of an online cipher around blockwise reordering layers. Explicitly, we show that with just two calls to the online cipher, prp security up to the birthday bound is both attainable and maximal. Moreover, we demonstrate that three calls to the online cipher suffice to obtain beyond birthday bound security. We provide a full proof of this for a prp construction, and, in the ±prp setting, security against adversaries who make queries of any single length. As part of our investigation, we extend an observation by Rogaway and Zhang by further highlighting the close relationship between online ciphers and tweakable blockciphers with variable-length tweaks.
2016
ASIACRYPT
Program Committees
- Eurocrypt 2022
- CHES 2021
- CHES 2019
- Eurocrypt 2019
- Crypto 2018
- FSE 2018
- FSE 2017
- Eurocrypt 2017
- Eurocrypt 2015
- FSE 2015
- FSE 2014
- Crypto 2013
- Eurocrypt 2012
- Eurocrypt 2011
- FSE 2011
- PKC 2010
- PKC 2008
Coauthors
- Elena Andreeva (1)
- Frederik Armknecht (1)
- Paul Baecher (1)
- Guy Barwell (2)
- Ritam Bhaumik (1)
- John Black (1)
- Alexandra Boldyreva (2)
- Joppe W. Bos (1)
- Nicolas Costes (1)
- Ronald Cramer (1)
- Jean Paul Degabriele (3)
- Alexander W. Dent (1)
- Yevgeniy Dodis (1)
- Pooya Farshim (1)
- Serge Fehr (1)
- Marc Fischlin (3)
- Ewan Fleischmann (1)
- Jake Longo Galea (1)
- Robert Granger (1)
- Dennis Hofheinz (2)
- Tibor Jager (1)
- Dimitar Jetchev (2)
- Eike Kiltz (1)
- Matthias Krause (1)
- Jooyoung Lee (3)
- Anja Lehmann (1)
- Arjen K. Lenstra (2)
- Tianren Liu (1)
- John Malone-Lee (2)
- Mark Manulis (1)
- Daniel P. Martin (4)
- Luke Mather (1)
- Mridul Nandi (1)
- Jonathan F. O'Connell (1)
- Elisabeth Oswald (4)
- Onur Özen (1)
- Onur Özen (4)
- Daniel Page (3)
- Kenneth G. Paterson (3)
- Krzysztof Pietrzak (1)
- Thomas Ristenpart (1)
- Phillip Rogaway (1)
- Dragos Rotaru (1)
- Karl Rubin (1)
- Dominique Schröder (1)
- Jacob C. N. Schuldt (1)
- Thomas Shrimpton (4)
- Alice Silverberg (1)
- Nigel P. Smart (1)
- Ryan Stanley-Oakes (1)
- John P. Steinberger (4)
- Stefano Tessaro (1)
- Susan Thomson (1)
- Michael Tunstall (1)
- Marten van Dijk (1)
- Bogdan Warinschi (2)
- David P. Woodruff (1)
- Moti Yung (1)