Paper 2019/1413

Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions

Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, and François-Xavier Standaert

Abstract

Authenticity can be compromised by information leaked via side-channels (e.g., power consumption). Examples of attacks include direct key recoveries and attacks against the tag verification which may lead to forgeries. At FSE 2018, Berti et al. described two authenticated encryption schemes which provide authenticity assuming a “leak-free implementation” of a Tweakable Block Cipher (TBC). Precisely, security is guaranteed even if all the intermediate computations of the target implementation are leaked in full but the TBC long-term key. Yet, while a leak-free implementation reasonably models strongly protected implementations of a TBC, it remains an idealized physical assumption that may be too demanding in many cases, in particular, if hardware engineers mitigate the leakage to a good extent but (due to performance constraints) do not reach leak-freeness. In this paper, we get rid of this important limitation by introducing the notion of “Strong Unpredictability with Leakage” for BC's and TBC's. It captures the hardness for an adversary to provide a fresh and valid input/output pair for a (T)BC, even having oracle access to the (T)BC, its inverse and their leakages. This definition is game-based and may be verified/falsified by laboratories. Based on it, we then provide two Message Authentication Codes (MAC) which are secure if the (T)BC on which they rely are implemented in a way that maintains a sufficient unpredictability. Thus, we improve the theoretical foundations of leakage-resilient MAC and extend them towards engineering constraints that are easier to achieve in practice.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Minor revision. Inscrypt 2019
Keywords
Leakage-resilient MACtweakable block cipherunpredictability
Contact author(s)
thomas peters @ uclouvain be
History
2019-12-06: received
Short URL
https://ia.cr/2019/1413
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/1413,
      author = {Francesco Berti and Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert},
      title = {Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions},
      howpublished = {Cryptology ePrint Archive, Paper 2019/1413},
      year = {2019},
      note = {\url{https://eprint.iacr.org/2019/1413}},
      url = {https://eprint.iacr.org/2019/1413}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.