Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
12. International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10). Santa Barbara, USA (17.08.2010-20.08.2010)
doi: 10.1007/978-3-642-15031-9_26
Konferenzveröffentlichung, Bibliographie
Kurzbeschreibung (Abstract)
The power of side-channel leakage attacks on cryptographic implementations is evident. Today’s practical defenses are typically attack-specific countermeasures against certain classes of side-channel attacks. The demand for a more general solution has given rise to the recent theoretical research that aims to build provably leakage-resilient cryptography. This direction is, however, very new and still largely lacks practitioners’ evaluation with regard to both efficiency and practical security. A recent approach, One-Time Programs (OTPs), proposes using Yao’s Garbled Circuit (GC) and very simple tamper-proof hardware to securely implement oblivious transfer, to guarantee leakage resilience.
Our main contributions are (i) a generic architecture for using GC/ OTP modularly, and (ii) hardware implementation and efficiency analysis of GC/OTP evaluation. We implemented two FPGA-based prototypes: a system-on-a-programmable-chip with access to hardware crypto accelerator (suitable for smartcards and future smartphones), and a stand-alone hardware implementation (suitable for ASIC design). We chose AES as a representative complex function for implementation and measurements. As a result of this work, we are able to understand, evaluate and improve the practicality of employing GC/OTP as a leakage-resistance approach.
Typ des Eintrags: | Konferenzveröffentlichung |
---|---|
Erschienen: | 2010 |
Autor(en): | Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas |
Art des Eintrags: | Bibliographie |
Titel: | Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs |
Sprache: | Englisch |
Publikationsjahr: | August 2010 |
Ort: | Berlin |
Verlag: | Springer |
Buchtitel: | Cryptographic Hardware and Embedded Systems, CHES 2010 |
Reihe: | Lecture Notes in Computer Science |
Band einer Reihe: | 6225 |
Veranstaltungstitel: | 12. International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10) |
Veranstaltungsort: | Santa Barbara, USA |
Veranstaltungsdatum: | 17.08.2010-20.08.2010 |
DOI: | 10.1007/978-3-642-15031-9_26 |
URL / URN: | https://encrypto.de/papers/JKSS10OTP.pdf |
Kurzbeschreibung (Abstract): | The power of side-channel leakage attacks on cryptographic implementations is evident. Today’s practical defenses are typically attack-specific countermeasures against certain classes of side-channel attacks. The demand for a more general solution has given rise to the recent theoretical research that aims to build provably leakage-resilient cryptography. This direction is, however, very new and still largely lacks practitioners’ evaluation with regard to both efficiency and practical security. A recent approach, One-Time Programs (OTPs), proposes using Yao’s Garbled Circuit (GC) and very simple tamper-proof hardware to securely implement oblivious transfer, to guarantee leakage resilience. Our main contributions are (i) a generic architecture for using GC/ OTP modularly, and (ii) hardware implementation and efficiency analysis of GC/OTP evaluation. We implemented two FPGA-based prototypes: a system-on-a-programmable-chip with access to hardware crypto accelerator (suitable for smartcards and future smartphones), and a stand-alone hardware implementation (suitable for ASIC design). We chose AES as a representative complex function for implementation and measurements. As a result of this work, we are able to understand, evaluate and improve the practicality of employing GC/OTP as a leakage-resistance approach. |
Fachbereich(e)/-gebiet(e): | 20 Fachbereich Informatik 20 Fachbereich Informatik > Systemsicherheit Zentrale Einrichtungen 20 Fachbereich Informatik > EC SPRIDE 20 Fachbereich Informatik > EC SPRIDE > Engineering Cryptographic Protocols (am 01.03.18 aufgegangen in Praktische Kryptographie und Privatheit) |
Hinterlegungsdatum: | 25 Jun 2012 13:30 |
Letzte Änderung: | 31 Jul 2024 09:02 |
PPN: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |