[April 14, 2010]
Speaker: Krzysztof Pietrzak, CWI
Title: Tamper proof (double feature)
Abstract: I will present two approaches which aim to protect
cryptographic hardware against "tampering attacks". In such attacks,
the memory or computing circuit is tampered, in the hopes that future
interaction with the modified system will reveal some secret
information.
I'll first present the notion of "non-malleable codes" and how they
provide an algorithmic solution to protect against tampering attacks
on the memory (this is based on joint work with Stefan Dziembowski and
Daniel Wichs, ICS 2010)
The general problem where the adversary can tamper with the entire
circuit (i.e. set/flip the values on every wire) is harder to get
by. I'll show a transformation that makes any circuit tamper-proof,
even if the adversary can tamper with every wire in the entire
circuit, as long as each tampering attempt fails with some probability
d>0. Earlier work ("private circuits II" by Ishai et al.) considered
the case d=0, but where one only could tamper with a fixed number of
wires between every two invocations.
(this is joint work with Sebastian Faust and Daniele Venturi)
The talk is funded by a grant from Walmart