securing circuits
play

Securing Circuits Against Constant-Rate Tampering Dana - PowerPoint PPT Presentation

Securing Circuits Against Constant-Rate Tampering Dana Dachman-Soled Yael Tauman Kalai Microsoft Research Tamper-Resilient Circuits [Ishai-Prabhakaran-Sahai-Wagner06] wire tampering: Tamper with me toggle, set wire to 0/1 I will


  1. Securing Circuits Against Constant-Rate Tampering Dana Dachman-Soled Yael Tauman Kalai Microsoft Research

  2. Tamper-Resilient Circuits [Ishai-Prabhakaran-Sahai-Wagner06] wire tampering: Tamper with me toggle, set wire to 0/1 I will self destruct! [IPSW06]: 1/size tampering rate Our work: 1/const tampering rate

  3. Physical Attacks Cold-boot attack [Halderman-Schoen- Heninger-Clarkson- Calandrino-Feldman- Appelbaum – Felten08] Fault attacks [Boneh-DeMillo-Lipton97, Timing attacks Biham- Shamir98, …] [Kocher96,…] Power attacks [Kocher-Jaffe- Jun99,…] Radiation Attacks Acoustic attacks [Agrawal-Archambeault- [Shamir-Tromer] Rao-Rohatgi02]

  4. Leakage attacks Tampering attacks Cold-boot attack [Halderman-Schoen- Heninger-Clarkson- Calandrino-Feldman- Appelbaum – Felten08] Fault attacks [Boneh-DeMillo-Lipton97, Timing attacks Biham- Shamir98, …] [Kocher96,…] Power attacks [Kocher-Jaffe- Jun99,…] Radiation Attacks Acoustic attacks [Agrawal-Archambeault- [Shamir-Tromer] Rao-Rohatgi02]

  5. Leakage attacks Tampering attacks [Rivest1997, Boyko1999, Canetti-Dodis- [Bellare-Kohno2003, Gennaro-Lysyanskaya-Malkin- Halevi-Kushilevitz-Sahai2000, Ishai-Sahai- Micali-Rabin2004, Ishai-Prabhakaran-Sahai- Wagner2003, Micali-Reyzin2004, Ishai- Wagner2006, Applebaum-Harnik-Ishai2010, Prabhakaran-Sahai-Wagner2006, Dziembowski-Pietrzak-Wichs2010, Kalai-kanakhurthi- Dziembowski-Pietrzak2008, Pietrzak2009 , Sahai2011, , Choi-Kiayias-Malkin11, Kalai-Lewko- Akavia-Goldwasser-Vaikuntanathan2009, Rao2011, Liu-Lysyanskaya12] Dodis-K-Lovett2009, Naor-Segev2009, Katz- Vaikuntanathan2009, Alwen-Dodis- Wichs2009, Alwen-Dodis-Naor-Segev- Walfish-Wichs2009, Faust-Kiltz-Pietrzak- Rothblum2009, Faust-Rabin-Reyzin-Tromer- Vaikuntanathan2010, Dodis-Goldwasser-K- Peikert-Vaikuntanathan2010, Goldwasser-K- Peikert-Vaikuntanathan2010, Juma- Vahlis2010, Goldwasswer-Rothblum2010, Canetti-K-Mayank-Wichs2010, Dodis- Haralambiev-LopezAlt-Wichs2010, Brakerski-K-Katz-Vaikuntanathan2010, Boyle-Segev-Wichs2010, Dodis- Pietrzak2010, Braverman-Hassidim-K2010, Lewko-Waters2010, Lewko-Rouselakis- Waters2011, Lewko-Lewko-Waters2011, Jain-Pietrzak2011, Bitansky-Canetti-Halevi- Goldwasser-K-Rothblum2011, Bitansky- Canetti-Halevi2011, Garg-Jain-Sahai2011, Brakerski-K2011, Dodis-Lewko-Waters- Wichs2011,Boyle-Garg-Goldwasser-Jain- Sahai11…]

  6. Our Results Compiler 𝐷’ 𝐷 “tamper r esilient” Need to define: 1. Tampering model 2. Security guarantee

  7. Theoretical Result

  8. Tampering Model (tampering with individual wires) Inspired by [Ishai-Prabhakaran-Sahai-Wagner2006] input 𝑦 𝑗 𝐷 tampering function 𝑦 𝑗 Memory Secret 𝑡 Public input 𝑦 𝑗

  9. Tampering Model (tampering with individual wires) Inspired by [Ishai-Prabhakaran-Sahai-Wagner2006] input 𝑦 𝑗 tampering function 𝑦 𝑗 Impossible! Memory Secret 𝑡 Public input [IPSW06] 𝑦 𝑗

  10. Tampering Model (tampering with individual wires) Inspired by [Ishai-Prabhakaran-Sahai-Wagner2006] input 𝑦 𝑗 tampering function 𝑦 𝑗 Memory Secret 𝑡 𝑗 Public input 𝑦 𝑗

  11. Our Results Compiler 𝐷’ 𝐷 tamper resilient Need to define: 1. Tampering model 2. Security guarantee

  12. Security Guarantee there exists simulator 𝑇𝑗𝑛 s.t. For every 𝑇𝑗𝑛 𝐷 ≈ , 𝑀(𝑡) 𝑡 𝑗 𝑦 𝑗 When did self- Only log bits destruct occur of leakage

  13. Our Results Compiler 𝐷’ 𝐷 tamper resilient • Resilient to constant tampering rate. • Information theoretic

  14. Comparison with [IPSW06] [IPSW06] Our Work 1 Tampering rate < Tampering rate is const . 𝑙 Uses randomness gates or Information theoretic relies on computational no need for randomness assumptions No leakage log bits of leakage Non-persistent Persistent faults faults

  15. Other Related Work • Fault-tolerant computation [VonNeumann56, . . ., KLM94, GZ95, KRL12] • Tampering only with the memory gates. [Gennaro-Lysyanskaya-Malkin-Micali-Rabin2004, Applebaum- Harnik-Ishai2010, Dziembowski-Pietrzak-Wichs2010, Kalai- Kanakhurthi-Sahai2011 , Choi-Kiayias-Malkin11, Liu- Lysyanskaya12] • Tampering with the entire circuit: [IPSW06, Faust-Pietrzak-Venturi11] – [FPV11] logarithmic leakage. – [FPV11] tamper with wires, but random errors

  16. Overview of our Construction tamper- Starting point [IPSW06]: resilient Add tamper-detection component that erases memory if tampering is detected. Key : Tamper-detection component in 𝑂𝐷 0 . . . circuit of constant size Tool: PCP of Proximity [Ben-Sasson-Goldreich-Harsha-Sudan-Vadhan06]

  17. Overview of our Construction (Cont.) Tool: PCP of Proximity [Ben-Sasson-Goldreich-Harsha-Sudan-Vadhan06] 𝐷 PCPP for 𝐷(𝑦) = 𝑐 Compiler 𝐷 Memory Secret 𝑡 Public input 𝑦 Memory Secret 𝑡 Public input 𝑦

  18. 𝑐 Error Cascade Output ˄ 𝐻 𝑝𝑣𝑢 ˄ 𝐻 𝑑𝑏𝑡 PCPP Verification b PCPP Computation Circuit Computation X = ECC(x) Encoding Memory: S = ECC(s) of Input Input: x

  19. Summary Compiler 𝐷’ 𝐷 tamper resilient • Resilient to constant tampering rate. • Information theoretic • Extend to leakage + tampering (in the paper)

  20. Thank you!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend