Academic
Publications
A block cipher based pseudo random number generator secure against side-channel key recovery

A block cipher based pseudo random number generator secure against side-channel key recovery,10.1145/1368310.1368322,Christophe Petit,François-xavier

A block cipher based pseudo random number generator secure against side-channel key recovery   (Citations: 21)
BibTex | RIS | RefWorks Download
We study the security of a block cipher-based pseudorandom number generator (PRNG), both in the black box world and in the physical world, separately. We first show that the construction is a secure PRNG in the ideal cipher model. Then, we demonstrate its security against a Bayesian side-channel key recovery adversary. As a main result, we show that our construction guarantees that the success rate of the adversary does not increase with the number of physical observations, but in a limited and controlled way. Besides, we observe that, under common assumptions on side-channel attack strategies, increasing the security parameter (typically the block cipher key size) by a polynomial factor involves an increase of a side-channel attack complexity by an exponential factor, making the probability of a successful attack negligible. We believe this work provides a first interesting example of the way the algorithmic design of a cryptographic scheme influences its side-channel resistance.
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
    • ...The model of Micali et al. has been specialized to a framework for the evaluation of side-channel attacks by Standaert, Malkin, and Yung [51] (henceforth called the SMY-model), with applications described in [33, 42, 50]...

    Boris Köpfet al. Automatically deriving information-theoretic bounds for adaptive side-...

    • ...Standaert et al. [43] consider a restricted version of the [31] model which still captures reasonable adversaries and leakage functions that have been successfully used in practice to break systems...
    • ...In this model Petit et al. [36] analyze a block-cipher based construction for a PRNG (cf...

    Sebastian Faustet al. Leakage-Resilient Signatures

    • ...A large body of work has accumulated by now in which different classes of side channel attacks have been defined and different cryptographic primitives have been designed to provably withstand these attacks (See [5, 15, 18, 9, 1, 2, 20, 8, 24, 23, 14, 9, 10] and the references therein)...

    Yevgeniy Dodiset al. Public-Key Encryption Schemes with Auxiliary Inputs

    • ...There has lately been a growing amount of interest in coming up with precise definitions of security against side-channel attacks and in designing cryptographic algorithms that withstand these attacks (e.g., [24,19,28,17,11,8,29,3,25,9] and others)...
    • ...Standaert et al. [35] consider security against particular attacks such as Hamming weight attacks and analyze in [28] the security of a block-cipher based construction of a pseudorandom number generator...

    Sebastian Faustet al. Protecting Circuits from Leakage: the Computationally-Bounded and Nois...

    • ...Petit, et al. [33] construct pseudorandom generators that are secure against specific, naturally occurring, classes of leakage such as the Hamming weight leakage...

    Zvika Brakerskiet al. Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient t...

Sort by: