Paper 2010/276

Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs

Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider

Abstract

The power of side-channel leakage attacks on cryptographic implementations is evident. Today's practical defenses are typically attack-specific countermeasures against certain classes of side-channel attacks. The demand for a more general solution has given rise to the recent theoretical research that aims to build provably leakage-resilient cryptography. This direction is, however, very new and still largely lacks practitioners' evaluation with regard to both efficiency and practical security. A recent approach, One-Time Programs (OTPs), proposes using Yao's Garbled Circuit (GC) and very simple tamper-proof hardware to securely implement oblivious transfer, to guarantee leakage resilience. Our main contributions are (i) a generic architecture for using GC/OTP modularly, and (ii) hardware implementation and efficiency analysis of GC/OTP evaluation. We implemented two FPGA-based prototypes: a system-on-a-programmable-chip with access to hardware crypto accelerator (suitable for smartcards and future smartphones), and a stand-alone hardware implementation (suitable for ASIC design). We chose AES as a representative complex function for implementation and measurements. As a result of this work, we are able to understand, evaluate and improve the practicality of employing GC/OTP as a leakage-resistance approach. Last, but not least, we believe that our work contributes to bringing together the results of both theoretical and practical communities.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Full version of CHES 2010 paper.
Keywords
Garbled CircuitHardware ImplementationLeakage-ResilienceOne-Time ProgramsSecure Function Evaluation
Contact author(s)
thomas schneider @ trust rub de
History
2010-06-17: revised
2010-05-11: received
See all versions
Short URL
https://ia.cr/2010/276
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2010/276,
      author = {Kimmo Järvinen and Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider},
      title = {Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs},
      howpublished = {Cryptology {ePrint} Archive, Paper 2010/276},
      year = {2010},
      url = {https://eprint.iacr.org/2010/276}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.