Projects per year
Abstract
We put forward the first practical message authentication code (MAC) which is provably secure against continuous leakage under the Only Computation Leaks Information (OCLI) assumption. Within the context of continuous leakage, we introduce a novel modular proof technique: while most previous schemes are proven secure directly in the face of leakage, we reduce the (leakage) security of our scheme to its non-leakage security. This modularity, while known in other contexts, has two advantages: it makes it clearer which parts of the proof rely on which assumptions (i.e. whether a given assumption is needed for the leakage or the non-leakage security) and it also means that, if the security of the non-leakage version is improved, the security in the face of leakage is improved ‘for free’. We conclude the paper by discussing implementations; one on a popular core for embedded systems (the ARM Cortex-M4) and one on a high end processor (Intel i7), and investigate some performance and security aspects.
Original language | English |
---|---|
Title of host publication | Cryptography and Coding - IMACC 2015 |
Subtitle of host publication | 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings |
Editors | Jens Groth |
Publisher | Springer |
Pages | 295-310 |
Number of pages | 16 |
Volume | 9496 |
ISBN (Print) | 9783319272382 |
DOIs | |
Publication status | Published - Dec 2015 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Volume | 9496 |
ISSN (Print) | 0302-9743 |
Fingerprint
Dive into the research topics of 'A Leakage Resilient MAC'. Together they form a unique fingerprint.Projects
- 1 Finished
-
SILENT: Rework of Side channels-theory and implications for society
Oswald, M. E.
1/01/11 → 1/04/16
Project: Research