2021
DOI: 10.1007/978-3-030-77886-6_13
|View full text |Cite
|
Sign up to set email alerts
|

Leakage Resilient Value Comparison with Application to Message Authentication

Abstract: Side-channel attacks are a threat to secrets stored on a device, especially if an adversary has physical access to the device. As an effect of this, countermeasures against such attacks for cryptographic algorithms are a well-researched topic. In this work, we deviate from the study of cryptographic algorithms and instead focus on the sidechannel protection of a much more basic operation, the comparison of a known attacker-controlled value with a secret one. Comparisons sensitive to side-channel leakage occur … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 53 publications
(93 reference statements)
0
5
0
Order By: Relevance
“…The previous positive result heavily relies on the inverse-based verification of LR-MAC1. In this subsection, we show that such a positive result is not always obtained by exhibiting attacks against other verification algorithms that recompute the correct tag like analyzed in [DM21]. Those are typically encountered in permutation-based designs like Ascon [DEMS21] or ISAP [DEM + 20].…”
Section: Attacks Against Other Macsmentioning
confidence: 98%
See 1 more Smart Citation
“…The previous positive result heavily relies on the inverse-based verification of LR-MAC1. In this subsection, we show that such a positive result is not always obtained by exhibiting attacks against other verification algorithms that recompute the correct tag like analyzed in [DM21]. Those are typically encountered in permutation-based designs like Ascon [DEMS21] or ISAP [DEM + 20].…”
Section: Attacks Against Other Macsmentioning
confidence: 98%
“…Attacking a SPA-secure Design with DPA. Consider Figure 1 in [DM21]. The high-level idea of this leakage-resilient tag verification algorithm is that it maintains the message integrity if the inputs S and T (corresponding to the tag) of a permutation are secure against Simple Power Analysis (i.e., single-input attacks, roughly).…”
Section: Attacks Against Other Macsmentioning
confidence: 99%
“…This assumption is made for Slae and its generic construction FGHF ′ [DJS19,KS20]. Methods to achieve this are presented in [DM21].…”
Section: Leakage Security Notionsmentioning
confidence: 99%
“…Theoretical treatments of block cipher based or TBC-based designs include [BKP + 18, BPPS17, PSV15] and [BGPS21]. Theoretical treatments of permutation-based designs include [DJS19, DM19, GPPS20] and [DM21]. Examples of grade-3 designs (which enable leveled implementations with CIML2 and CCAmL2 guarantees) include TEDT and TEDT2 which are TBC-based [BGP + 20, Lis21] and ISAP which is permutation-based [DEM + 20].…”
Section: Related Workmentioning
confidence: 99%