2014
DOI: 10.1007/978-3-642-55220-5_24
|View full text |Cite
|
Sign up to set email alerts
|

Unifying Leakage Models: From Probing Attacks to Noisy Leakage.

Abstract: Abstract. A recent trend in cryptography is to formally show the leakage resilience of cryptographic implementations in a given leakage model. One of the most prominent leakage modelsthe so-called bounded leakage model -assumes that the amount of leakage is a-priori bounded. Unfortunately, it has been pointed out that the assumption of bounded leakages is hard to verify in practice. A more realistic assumption is to assume that leakages are sufficiently noisy, following the engineering observation that real-wo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
38
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 143 publications
(38 citation statements)
references
References 32 publications
0
38
0
Order By: Relevance
“…The state of the abort signal (true or false) is returned as well. Following the notation by Duc et al [13], for t " 0, ..., , a pd, kq-threshold-probe-and-faulting adversary on F 2 m is a machine A that plays the following game against an oracle O: Security consists of both a privacy and a correctness aspect. The number of probe and faults an adversary needs to place to break the scheme determines the order of security.…”
Section: The Circuit Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The state of the abort signal (true or false) is returned as well. Following the notation by Duc et al [13], for t " 0, ..., , a pd, kq-threshold-probe-and-faulting adversary on F 2 m is a machine A that plays the following game against an oracle O: Security consists of both a privacy and a correctness aspect. The number of probe and faults an adversary needs to place to break the scheme determines the order of security.…”
Section: The Circuit Modelmentioning
confidence: 99%
“…The described probing adversary is capable of reading the exact values on a number of circuit wires, where the minimal number of observed wires needed to uncover a sensitive variable is defined as the order of probing security. Probing security can be reduced to the noisy leakage model as shown by Duc et al [13] where the assumptions lie in the presence of sufficient noise and independent wire leakage. The probing model is extended by Barthe et al [1] to capture composable security called the non-interference model in which several secure countermeasures have been made, e.g., [3-5, 8, 10, 14, 16, 23].…”
Section: Introductionmentioning
confidence: 99%
“…When considering the effect of glitches, with each probe the adversary can read all the input values which flow to that wire until a register is reached. The interested reader is encouraged to learn more about this model in [10], a comparison of the probing model with other leakage models is given in [13], and the proof of the reduction of the noisy leakage model to the probing model is found in [9]. In threshold circuits, the glitch-robust adversary transforms into an adversary reading the circuit's component functions due to the component functions being walled-off by registers.…”
Section: First-order Probing Securitymentioning
confidence: 99%
“…Then, the attacker's view of the circuit elements may be noisy (the noisy leakage model [CJRR99]), or the attacker may be limited by the number of wires of the circuit that it can observe within a certain period of time (the probing model [ISW03]). The noisy leakage model and probing model have been unified [DDF14]. In both models, under some reasonable assumptions on the statistical distributions of sidechannel information, the complexity of a side-channel attack of a suitable implementation with an n-out-of-n secret-sharing increases exponentially with the number of shares.…”
Section: Side-channel and Fault Attacksmentioning
confidence: 99%