Kryptographie jenseits des Black-box Modells
Zusammenfassung der Projektergebnisse
The main goals of this project were to overcome the limitations of the black-box model in realworld scenarios and to design a sound theory for analyzing cryptographic implementations. The work done in this project significantly enhanced the state-of-the-art and contributed to the development of provably secure cryptographic implementations. In particular, we investigated side-channel attacks, fault-attacks, and hardware trojans. In all three areas, we developed sound security models and provided efficient countermeasures. In the following we briefly summarize our contribution. ● Side-channel resilience: We developed two practical-oriented verification tools to verify leakage resilience of algorithms and circuits: scVerif analyzes hardware-specific leakages and STRAPS analyzes the natural nature of noisy leakage. Additionally, we developed secure compilers to protect arbitrary cryptographic primitives against side-channel leakage. ● Tamper resilience: Faulty keys are a common problem that leads to various security vulnerabilities. We analyzed this security challenge and followed two research directions. First, we developed a non-malleable code that cannot be attacked by an adversary with bounded space. Finally, we constructed an authenticated encryption scheme that is resistant against functions from a given set of tamper functions. ● Trojan resilience: Similar to the approach of tamper resilience, we designed a secure compiler to protect arbitrary circuits against such attacks and we successfully worked on trojan resilient encryption schemes.
Projektbezogene Publikationen (Auswahl)
-
Circuit Compilers with O(1/\log (n)) Leakage Rate. EUROCRYPT 2016
Andrychowicz, Marcin; Dziembowski, Stefan & Faust, Sebastian
-
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification. CCS 2016
Dziembowski, Stefan; Faust, Sebastian & Standaert, François-Xavier
-
Amortizing Randomness Complexity in Private Circuits. ASIACRYPT 2017
Faust, Sebastian; Paglialonga, Clara & Schneider, Tobias
-
Non-Malleable Codes for Space-Bounded Tampering. CRYPTO 2017
Faust, Sebastian; Hostáková, Kristina; Mukherjee, Pratyay & Venturi, Daniele
-
Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model. CHES 2018
S. Faust, V. Grosso, S. M. Del Pozo, C. Paglialonga, F.-X. Standaert
-
General State Channel Networks. CCS 2018
Dziembowski, Stefan; Faust, Sebastian & Hostáková, Kristina
-
Unifying Leakage Models: From Probing Attacks to Noisy Leakage. J. Cryptol 2019
Duc, Alexandre; Dziembowski, Stefan & Faust, Sebastian
-
Simple Refreshing in the Noisy Leakage Model. ASIACRYPT 2019
Dziembowski, Stefan; Faust, Sebastian & Żebrowski, Karol
-
Deterministic Wallets in a Quantum World. CCS 2020
Alkeilani Alkadri, Nabil; Das, Poulami; Erwig, Andreas; Faust, Sebastian; Krämer, Juliane; Riahi, Siavash & Struck, Patrick
-
Fuzzy Asymmetric Password-Authenticated Key Exchange. ASIACRYPT 2020
Erwig, Andreas; Hesse, Julia; Orlt, Maximilian & Riahi, Siavash
-
Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification. CHES 2021
Barthe, Gilles; Gourjon, Marc; Grégoire, Benjamin; Orlt, Maximilian; Paglialonga, Clara & Porth, Lars
-
Towards Tight Random Probing Security. CRYPTO 2021
Cassiers, Gaëtan; Faust, Sebastian; Orlt, Maximilian & Standaert, François-Xavier
