Skip to Main content Skip to Navigation
Journal articles

Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis

Abstract : Leakage-resilient cryptography aims at developing new algorithms for which physical security against side-channel attacks can be formally analyzed. Following the work of Dziembowski and Pietrzak at FOCS 2008, several symmetric cryptographic primitives have been investigated in this setting. Most of them can be instantiated with a block cipher as underlying component. Such an approach naturally raises the question whether certain block ciphers are better suited for this purpose. In order to answer this question, we consider a leakage-resilient re-keying function, and evaluate its security at different abstraction levels. That is, we study possible attacks exploiting specific features of the algorithmic description, hardware architecture and physical implementation of this construction. These evaluations lead to two main outcomes. First, we complement previous works on leakage-resilient cryptography and further specify the conditions under which they actually provide physical security. Second, we take advantage of our analysis to extract new design principles for block ciphers to be used in leakage-resilient primitives. While our investigations focus on side-channel attacks in the first place, we hope these new design principles will trigger the interest of symmetric cryptographers to design new block ciphers combining good properties for secure implementations and security against black box (mathematical) cryptanalysis.
Document type :
Journal articles
Complete list of metadata
Contributor : Sonia Belaid Connect in order to contact the contributor
Submitted on : Friday, February 6, 2015 - 5:12:19 PM
Last modification on : Monday, April 4, 2022 - 10:40:40 AM

Links full text




Sonia Belaïd, Fabrizio de Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, et al.. Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis. Journal of Cryptographic Engineering, Springer, 2014, 4 (3), pp.15. ⟨10.1007/s13389-014-0079-5⟩. ⟨hal-01113984⟩



Record views