TY - GEN
T1 - On the correctness of an approach against side-channel attacks
AU - Wang, Peng
AU - Feng, Dengguo
AU - Wu, Wenling
AU - Zhang, Liting
PY - 2009
Y1 - 2009
N2 - Side-channel attacks are a very powerful cryptanalytic technique. Li and Gu [ProvSec'07] proposed an approach against side-channel attacks, which states that a symmetric encryption scheme is IND-secure in side-channel model, if it is IND-secure in black-box model and there is no adversary who can recover the whole key of the scheme computationally in side-channel model, i.e. WKR-SCA λ IND → IND-SCA. Our researches show that it is not the case. We analyze notions of security against key recovery attacks and security against distinguishing attacks, and then construct a scheme which is WKR-SCA-secure and IND-secure, but not IND-SCA-secure in the same side-channel environment. Furthermore, even if the scheme is secure again partial key recovery attacks in side-channel model, this approach still does not hold true.
AB - Side-channel attacks are a very powerful cryptanalytic technique. Li and Gu [ProvSec'07] proposed an approach against side-channel attacks, which states that a symmetric encryption scheme is IND-secure in side-channel model, if it is IND-secure in black-box model and there is no adversary who can recover the whole key of the scheme computationally in side-channel model, i.e. WKR-SCA λ IND → IND-SCA. Our researches show that it is not the case. We analyze notions of security against key recovery attacks and security against distinguishing attacks, and then construct a scheme which is WKR-SCA-secure and IND-secure, but not IND-SCA-secure in the same side-channel environment. Furthermore, even if the scheme is secure again partial key recovery attacks in side-channel model, this approach still does not hold true.
KW - Provable security
KW - Side-channel attack
KW - Symmetric encryption
UR - http://www.scopus.com/inward/record.url?scp=70350630614&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-00843-6_29
DO - 10.1007/978-3-642-00843-6_29
M3 - Conference contribution
AN - SCOPUS:70350630614
SN - 3642008429
SN - 9783642008429
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 336
EP - 344
BT - Information Security Practice and Experience - 5th International Conference, ISPEC 2009, Proceedings
T2 - 5th International Conference on Information Security Practice and Experience, ISPEC 2009
Y2 - 13 April 2009 through 15 April 2009
ER -