抗泄露可证明安全流密码研究

Translated title of the contribution: Research on leakage-resilient stream ciphers with provable security
  • Yu Yu
  • , Da Wu Gu*
  • *Corresponding author for this work

Research output: Contribution to journalReview articlepeer-review

1 Scopus citations

Abstract

Side-channel attacks discovered by Kocher et al. in the late 90's, are cryptanalytic techniques that make use of physical leakages such as timing, power consumption, and can easily break many “mathematically sound” crypto-systems (e.g. AES, RSA) in practice. In FOCS 2008, Dziembowski and Pietrzak put forward the notion of leakage-resilient cryptography, and proposed a stream cipher provable secure against side-channel attacks, which is unprecedented in provable security where the primitives was usually treated as black-box. Later, Pietrzak simplified the construction and published it at Eurocrypt 2009, but the design still suffered from drawbacks such as key-size inefficiency and significant security loss. Subsequently, more researchers (including us) further simplified and improved the constructions in CCS 2010, CHES 2012, and CT-RSA 2013. In this paper, we provide an informative overview and introduction to all aforementioned constructions, including the improvements, drawbacks and the fundmental causes rooted in the designs. We also point out some mistakes in some public literatures, raise important open problems in this area, and look into the future directions of leakage-resilient cryptography.

Translated title of the contributionResearch on leakage-resilient stream ciphers with provable security
Original languageChinese (Traditional)
Pages (from-to)134-145
Number of pages12
JournalJournal of Cryptologic Research
Volume1
Issue number2
DOIs
StatePublished - 29 Apr 2014
Externally publishedYes

Fingerprint

Dive into the research topics of 'Research on leakage-resilient stream ciphers with provable security'. Together they form a unique fingerprint.

Cite this