Information leakage is a major concern in modern day ITsecurity. In fact, a malicious user is often able to extract information about private values from the computation performed on the devices. In specific settings, such as RFID, where a low computational complexity is required, it is hard to apply standard techniques to achieve resilience against this kind of attacks. In this paper, we present a framework to make cryptographic primitives based on large finite fields robust against information leakage with a bounded computational cost. The approach makes use of the inner product extractor and guarantees security in the presence of leakage in a widely accepted model. Furthermore, we show how to apply the proposed techniques to the authentication protocol Lapin, and we compare it to existing solutions.

Leakage-resilient cryptography over large finite fields: Theory and practice / Andrychowicz, M.; Masny, D.; Persichetti, E.. - (2015), pp. 655-674. - LECTURE NOTES IN COMPUTER SCIENCE. [10.1007/978-3-319-28166-7_32].

Leakage-resilient cryptography over large finite fields: Theory and practice

Persichetti E.
2015

Abstract

Information leakage is a major concern in modern day ITsecurity. In fact, a malicious user is often able to extract information about private values from the computation performed on the devices. In specific settings, such as RFID, where a low computational complexity is required, it is hard to apply standard techniques to achieve resilience against this kind of attacks. In this paper, we present a framework to make cryptographic primitives based on large finite fields robust against information leakage with a bounded computational cost. The approach makes use of the inner product extractor and guarantees security in the presence of leakage in a widely accepted model. Furthermore, we show how to apply the proposed techniques to the authentication protocol Lapin, and we compare it to existing solutions.
2015
Applied Cryptography and Network Security - 13th International Conference, ACNS 2015
978-3-319-28165-0
978-3-319-28166-7
Leakage; Finite Fields; Inner Product
02 Pubblicazione su volume::02a Capitolo o Articolo
Leakage-resilient cryptography over large finite fields: Theory and practice / Andrychowicz, M.; Masny, D.; Persichetti, E.. - (2015), pp. 655-674. - LECTURE NOTES IN COMPUTER SCIENCE. [10.1007/978-3-319-28166-7_32].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1673053
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 3
  • ???jsp.display-item.citation.isi??? ND
social impact