Главная
Study mode:
on
1
Intro
2
Transparency (as a measure of maturity)
3
Acknowledgments & cautionary note
4
AES Rijndael: y = AES (x)
5
Leakage function definition
6
Basic facts (0)
7
Consequence (for theoretical analysis)
8
Basic facts (1)
9
Summarizing (taxonomy of attacks)
10
Outline
11
Noise (hardware) is not enough
12
Masking (= noise amplification)
13
Masking (abstract view)
14
Masking (concrete view)
15
Masking (reduction)
16
Statistical intuition (2 shares)
17
Case study: ARM Cortex M4 [JS17]
18
Authenticated Encryption (AEAD)
19
Ciphertext Integrity with Leakage
20
Chosen Ciphertext Security
21
CCA Security with Leakage [GPPS18]
22
The challenge leakage controversy (0)
23
An motivating example
24
Seed: a leakage-resilient MAC
25
First tweak: LR tag verification
26
Engineering approach to CCAL security
27
A CCAML2 encryption scheme
28
Security reductions (simplified)
29
Example of full-fledged scheme
30
A theory to guide practice?
31
Open problems
32
Evaluation challenge
Description:
Explore an invited talk from Eurocrypt 2019 by François-Xavier Standaert on secure cryptographic implementations. Delve into topics such as transparency in cryptography, AES Rijndael, leakage function definitions, and basic facts about cryptographic attacks. Examine noise in hardware, masking techniques for noise amplification, and their applications in ARM Cortex M4. Investigate Authenticated Encryption (AEAD), ciphertext integrity with leakage, and Chosen Ciphertext Security. Analyze the challenge leakage controversy, leakage-resilient MAC, and engineering approaches to CCAL security. Discover CCAML2 encryption schemes, security reductions, and full-fledged scheme examples. Conclude by discussing the relationship between theory and practice in cryptography and exploring open problems in the field.

Towards an Open Approach to Secure Cryptographic Implementations

TheIACR
Add to list