A leakage resilient MAC

Daniel P. Martin*, Elisabeth Oswald, Martijn Stam, Marcin Wójcik

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We put forward the first practical message authentication code (MAC) which is provably secure against continuous leakage under the Only Computation Leaks Information (OCLI) assumption. Within the context of continuous leakage, we introduce a novel modular proof technique: while most previous schemes are proven secure directly in the face of leakage, we reduce the (leakage) security of our scheme to its non-leakage security. This modularity, while known in other contexts, has two advantages: it makes it clearer which parts of the proof rely on which assumptions (i. e. whether a given assumption is needed for the leakage or the non-leakage security) and it also means that, if the security of the non-leakage version is improved, the security in the face of leakage is improved ‘for free’. We conclude the paper by discussing implementations; one on a popular core for embedded systems (the ARM Cortex-M4) and one on a high end processor (Intel i7), and investigate some performance and security aspects.

Original languageEnglish
Title of host publicationCryptography and Coding - 15th IMA International Conference, IMACC 2015, Proceedings
EditorsJens Groth
PublisherSpringer Verlag
Pages295-310
Number of pages16
ISBN (Print)9783319272382
DOIs
Publication statusPublished - 2015
Event15th IMA International Conference on Cryptography and Coding, IMACC 2015 - Oxford, United Kingdom
Duration: 15 Dec 201517 Dec 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9496
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference15th IMA International Conference on Cryptography and Coding, IMACC 2015
Country/TerritoryUnited Kingdom
CityOxford
Period15/12/1517/12/15

Bibliographical note

Funding Information:
Dan Martin and Elisabeth Oswald have been supported in part by EPSRC via grant EP/I005226/1. Marcin Wójcik has been supported by the EU DG Home Affairs - ISEC (Prevention of and Fight against Crime) / INT (Illegal Use of Internet) programme and his research leading to these results has received funding from the European Union’s Seventh Framework Programme (FP7/2007-2013) under grant agreement n 609094. o

Publisher Copyright:
© Springer International Publishing Switzerland 2015.

Keywords

  • Implementation
  • Leakage resilience
  • Message authentication code
  • Provable security
  • Side channels

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'A leakage resilient MAC'. Together they form a unique fingerprint.

Cite this