Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Daniel P. Martin is active.

Publication


Featured researches published by Daniel P. Martin.


international cryptology conference | 2016

Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations

Daniel P. Martin; Luke Mather; Elisabeth Oswald; Martijn Stam

Quantifying the side channel security of implementations has been a significant research question for several years in academia but also among real world side channel practitioners. As part of security evaluations, efficient key rank estimation algorithms were devised, which in contrast to analyses based on subkey recovery, give a holistic picture of the security level after a side channel attack. However, it has been observed that outcomes of rank estimations show a huge spread in precisely the range of key ranks where enumeration could lead to key recovery. These observations raise the question whether this is because of insufficient rank estimation procedures, or, if this is an inherent property of the key rank. Furthermore, if this was inherent, how could key rank outcomes be translated into practically meaningful figures, suitable to analysing the risk that real world side channel attacks pose? This paper is a direct response to these questions. We experimentally identify the key rank distribution and show that it is independent of different distinguishers and signal-to-noise ratios. Then we offer a theoretical explanation for the observed key rank distribution and determine how many samples thereof are required for a robust estimation of some key parameters. We discuss how this can be naturally integrated into real world side channel evaluation practices. We conclude our research by connecting non-parametric order statistics, in particular percentiles, in a practically meaningful way with business goals.


international conference on the theory and application of cryptology and information security | 2014

Simulatable Leakage: Analysis, Pitfalls, and New Constructions

Jake Longo; Daniel P. Martin; Elisabeth Oswald; Daniel Page; Martijin Stam; Michael Tunstall

In 2013, Standaert et al. proposed the notion of simulatable leakage to connect theoretical leakage resilience with the practice of side channel attacks. Their use of simulators, based on physical devices, to support proofs of leakage resilience allows verification of underlying assumptions: the indistinguishability game, involving real vs. simulated leakage, can be ‘played’ by an evaluator. Using a concrete, block cipher based leakage resilient PRG and high-level simulator definition (based on concatenating two partial leakage traces), they included detailed reasoning why said simulator (for AES-128) resists state-of-the-art side channel attacks.


international conference on the theory and application of cryptology and information security | 2017

Authenticated Encryption in the Face of Protocol and Side Channel Leakage

Guy Barwell; Daniel P. Martin; Elisabeth Oswald; Martijn Stam

Authenticated encryption schemes in practice have to be robust against adversaries that have access to various types of leakage, for instance decryption leakage on invalid ciphertexts (protocol leakage), or leakage on the underlying primitives (side channel leakage). This work includes several novel contributions: we augment the notion of nonce-base authenticated encryption with the notion of continuous leakage and we prove composition results in the face of protocol and side channel leakage. Moreover, we show how to achieve authenticated encryption that is simultaneously both misuse resistant and leakage resilient, based on a sufficiently leakage resilient PRF, and finally we propose a concrete, pairing-based instantiation of the latter.


international conference on selected areas in cryptography | 2017

Quantum Key Search with Side Channel Advice

Daniel P. Martin; Ashley Montanaro; Elisabeth Oswald; Daniel J Shepherd

Recently, a number of results have been published that show how to combine classical cryptanalysis with quantum algorithms, thereby (potentially) achieving considerable speed-ups. We follow this trend but add a novel twist by considering how to utilise side channel leakage in a quantum setting. This is non-trivial because Grover’s algorithm deals with unstructured data, however we are interested in searching through a key space which has structure due to the side channel information. We present a novel variation of a key enumeration algorithm that produces batches of keys that can be efficiently tested using Grover’s algorithm. This results in the first quantum key search that benefits from side channel information.


the cryptographers’ track at the rsa conference | 2018

Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited

Daniel P. Martin; Luke Mather; Elisabeth Oswald

Motivated by the need to assess the concrete security of a device after a side channel attack, there has been a flurry of recent work designing both key rank and key enumeration algorithms. Two main competitors for key ranking can be found in the literature: a convolution based algorithm put forward by Glowacz et al. (FSE 2015), and a path counting based algorithm proposed by Martin et al. (Asiacrypt 2015). Both key ranking algorithms can be extended to key enumeration algorithms (Poussier et al. (CHES 2016) and Martin et al. (Asiacrypt 2015)). The two approaches were proposed independently, and have so far been treated as uniquely different techniques, with different levels of accuracy. However, we show that both approaches (for ranking) are mathematically equivalent for a suitable choice of their respective discretisation parameter. This settles questions about which one returns more accurate rankings. We then turn our attention to their related enumeration algorithms and determine why and how these algorithms differ in their practical performance.


international cryptology conference | 2015

Counting Keys in Parallel After a Side Channel Attack

Daniel P. Martin; Jonathan F. O'Connell; Elisabeth Oswald; Martijn Stam


Springer US | 2015

A Leakage Resilient MAC

Daniel P. Martin; Elisabeth Oswald; Martijn Stam; Marcin Wójcik


IACR Cryptology ePrint Archive | 2016

How low can you go? Using side-channel data to enhance brute-force key recovery.

Jake Longo; Daniel P. Martin; Luke Mather; Elisabeth Oswald; Benjamin Sach; Martijn Stam


IACR Cryptology ePrint Archive | 2015

How to Enumerate Your Keys Accurately and Efficiently After a Side Channel Attack.

Daniel P. Martin; Jonathan F. O'Connell; Elisabeth Oswald; Martijn Stam


IACR Cryptology ePrint Archive | 2018

A Note on Key Rank.

Daniel P. Martin; Marco Martinoli

Collaboration


Dive into the Daniel P. Martin's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge