Leakage Stefan Dziembowski Tomasz Kazana Daniel Wichs Main - - PowerPoint PPT Presentation

leakage
SMART_READER_LITE
LIVE PREVIEW

Leakage Stefan Dziembowski Tomasz Kazana Daniel Wichs Main - - PowerPoint PPT Presentation

Key-Evolution Schemes Resilient to Space Bounded Leakage Stefan Dziembowski Tomasz Kazana Daniel Wichs Main contribution We propose a secure scheme for deterministic key-evolution Properties: leakage-resilient in the random oracle


slide-1
SLIDE 1

Key-Evolution Schemes Resilient to Space Bounded Leakage

Stefan Dziembowski Tomasz Kazana Daniel Wichs

slide-2
SLIDE 2

Main contribution

Properties:

 leakage-resilient  in the random oracle model

We propose a secure scheme for

deterministic key-evolution

slide-3
SLIDE 3

Outline

  • 1. Key-Evolution Schemes Resilient to

Space Bounded Leakage

  • 2. Key-Evolution Schemes Resilient to

Space Bounded Leakage

  • 3. Previous results in the area
  • 4. The model
  • 5. Random Oracle Model – remarks
  • 6. Result and proof techniques
slide-4
SLIDE 4

Key-Evolution Schemes Resilient to Space Bounded Leakage

CRYPTO cryptographic device

slide-5
SLIDE 5

Key-Evolution Schemes Resilient to Space Bounded Leakage

cryptographic device

Side channel information:

 power consumption,  electromagnetic leaks,  timing information,

etc.

slide-6
SLIDE 6

Key-Evolution Schemes Resilient to Space Bounded Leakage

cryptographic scheme (standard) black-box access

additional access to the internal data

slide-7
SLIDE 7

Key-Evolution Schemes Resilient to Space Bounded Leakage

Generally speaking we model:

Side-channel leakage

Leakage caused by malicious software (viruses etc.)

slide-8
SLIDE 8

Key-Evolution Schemes Resilient to Space Bounded Leakage

K3 = f(K2) K2 = f(K1) K1 = f(K0)

In each round the secret key K gets refreshed. key evolution function f has to be deterministic Ki+1 = f(Ki) (no refreshing with external randomness)

K0

also the refreshing procedure may cause leakage New leakage in every round

Assumptions:

K4 = f(K3)

slide-9
SLIDE 9

Previous work on leakage- resilient key-evolution

Kocher:

Leakage function cannot make any random oracle calls

Output length is bounded slightly smaller then |k|

slide-10
SLIDE 10

Previous work on leakage- resilient key-evolution

Yu Yu et al.:

Leakage not adaptive

Leakage function cannot evaluate hash function (modeled as usual by random

  • racle model)
slide-11
SLIDE 11

Previous work on leakage- resilient key-evolution

Dziembowski and Pietrzak:

“only computation leaks information” model, so data can leak if and and only if it is accessed

slide-12
SLIDE 12

Our approach middle-of-the-road approach

Most prior “practical” papers

Simple and efficient

Intuitive notion of security without formal guarantees Most prior “theoretical” papers

Rigor and provable security

Strong restrictions, eg.

Only data actually used in computation can leak

slide-13
SLIDE 13

Modelling the leakage

“Memory attacks”, “Bounded-Retrieval Model”: The adversary is allowed to learn any input-shrinking function f of the secret:

K

f

f(K)

slide-14
SLIDE 14

Problem

The function f can compute the “future keys”:

K0 K1 K100 . . . compute K100 and leak from it

Moral: f has to be from a restricted class. Our solution: limit f computationally. we will assume that f is

space bounded

slide-15
SLIDE 15

The Model

big

device read / write s e n d / r e c e i v e

small

memory

unlimited limited

the “small” adversary can observe the key evolution and even partially control it Security requirement: the “future keys” should remain secret.

slide-16
SLIDE 16

The adversary can “partially control“ the key-evolution

K0 K1 K100 . . .

small small small

The only thing that we require is that the key gets really evolved.

Adversary can use his own algorithm for evolving keys Adversary can’t keep K0 in the memory and leak it bit by bit because he is forced to evolve

slide-17
SLIDE 17

The model remarks

Random oracle model

theoretical shortcoming

The leakage function that can make random oracle calls itself

We DO NOT rely on the assumption that only data used in the computation can leak

slide-18
SLIDE 18

The model remarks

Secure against even against restricted active attacks

Model seems to be too strong in this case. However now it protects also against implementation errors.

slide-19
SLIDE 19

We work in Random Oracle Model Why isn't it obvious?!

Consider a following hash function:

Key 0 Key 1 Hash (RO) PRG

You can leak here!

slide-20
SLIDE 20

Another wrong idea

Key 0 Key T

RO call

Key 1 Each key is divided into blocks that evaluates independently using RO

slide-21
SLIDE 21

Our solution

Only the compression function is modelled as a random oracle.

Key 0 Key 1 = f(Key 0)

This is f

REMARKS:

  • 1. 1. Additional

rows between keys

  • 2. 2. It is cyclic

Note: this requires almost no additional space.

slide-22
SLIDE 22

Our result

We show that f described above is secure key-evolution scheme in our model

c - amount of bits that the adversary can retrieve in each round

s – space that adversary can use (includes K)

We need:

4c + s ≤ 3 |K| / 2

slide-23
SLIDE 23

A pinch of the proof

We define some specific game to be played on acyclic graph with black and red pebbles Some rules describing when it is legal to move a pebble

  • r to put new pebble on the graph

How do I play?

DETAILS IN THE PAPER

Goal: put a pebble on some specific vertices Number of pebbles you can use is limited When you achieve some intermediate goal vertex – you get some new pebbles ≈ new round operation Forget the model. For a moment we play a game.

slide-24
SLIDE 24

Pebble game Real adversary with random oracle

A pinch of the proof

World A World B

Connection GOAL! memory Small adversary Big adversary RO call Key in memory inside Key in memory

  • utside

Random Oracle read/write rounds

slide-25
SLIDE 25

A pinch of the proof

Intuition: It is hard to pebble top row with limited number of pebbles

... ... ... ... Key 0 Key 1

Pebbling game corresponding to our construction f:

You saw this graph

  • before. But – it used

to be a graph of the

  • rder of calling RO.

Now it is a graph for a game.

slide-26
SLIDE 26

A pinch of the proof

Remark: Connection is not trivial!

Intermediate keys are not atoms For example an adversary may delete just few last bits of each key and “guess” those when needed (so in fact adversary may put just a part of pebble on a vertex) The proof should somehow include above possibility

slide-27
SLIDE 27

Thank you!