Symbolic methods in computational cryptography proofs

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Code-based game-playing is a popular methodology for proving security of cryptographic constructions and side-channel countermeasures. This methodology relies on treating cryptographic proofs as an instance of relational program verification (between probabilistic programs), and decomposing the latter into a series of elementary relational program verification steps. In this paper, we develop principled methods for proving such elementary steps for probabilistic programs that operate over finite fields and related algebraic structures. We focus on three essential properties: program equivalence, information flow, and uniformity. We give characterizations of these properties based on deducibility and other notions from symbolic cryptography. We use (sometimes improve) tools from symbolic cryptography to obtain decision procedures or sound proof methods for program equivalence, information flow, and uniformity. Finally, we evaluate our approach using examples drawn from provable security and from side-channel analysis-for the latter, we focus on the masking countermeasure against differential power analysis. A partial implementation of our approach is integrated in EasyCrypt, a proof assistant for provable security, and in MaskVerif, a fully automated prover for masked implementations.

Original languageEnglish
Title of host publicationProceedings - 2019 IEEE 32nd Computer Security Foundations Symposium, CSF 2019
PublisherIEEE Computer Society
Pages136-151
Number of pages16
ISBN (Electronic)9781728114064
DOIs
Publication statusPublished - 1 Jun 2019
Event32nd IEEE Computer Security Foundations Symposium, CSF 2019 - Hoboken, United States
Duration: 25 Jun 201928 Jun 2019

Publication series

NameProceedings - IEEE Computer Security Foundations Symposium
Volume2019-June
ISSN (Print)1940-1434

Conference

Conference32nd IEEE Computer Security Foundations Symposium, CSF 2019
Country/TerritoryUnited States
CityHoboken
Period25/06/1928/06/19

Keywords

  • Computer aided cryptography
  • Decidability and complexity
  • Formal methods and verification

Fingerprint

Dive into the research topics of 'Symbolic methods in computational cryptography proofs'. Together they form a unique fingerprint.

Cite this