Abstract

Authenticated ciphers are designed to provide two security requirements simultaneously, i.e. confidentiality and integrity. The CAESAR competition was ended with introducing six authenticated ciphers for several applications as the winners. The OCB and COLM authenticated ciphers are two AES-based winners, respectively for high-speed and defense in-depth applications. Similar to the implementation of any other cryptographic algorithm, unprotected implementations of these ciphers could also be vulnerable to side-channel attacks, especially differential power analysis (DPA). In this work, first, the OCB and COLM ciphers are implemented on FPGA of SAKURA-G board. Then their vulnerability is shown with power leakage detection using t-test over the power traces. Also, the first-order protected version of these ciphers is presented using two masking scheme, i.e. threshold implementation (TI) and domain-oriented masking (DOM). To verify these countermeasures, the first and second-order t-test is conducted, to indicate the resistance of protected schemes to the first-order DPA attacks. Finally, the hardware implementation of two protected and unprotected versions of ciphers on FPGA are benchmarked based on the criteria of area, maximum frequency, and throughput. Additionally, the ratio of the increased area and decreased throughput to the unprotected ciphers have been compared with previous works.

Highlights

  • Authenticated encryption (AE) provides two security objectives, i.e. confidentiality and integrity of plaintext simultaneously

  • The random values and initial inputs sharing are generated by control FPGA and is sent to main FPGA

  • For t-test, the selection of the constant or random inputs is done in control FPGA

Read more

Summary

INTRODUCTION

Authenticated encryption (AE) provides two security objectives, i.e. confidentiality and integrity of plaintext simultaneously. For high-performance application, SP800-38D standard [3] suggest the GCM (Galois/Counter mode) These two schemes are widely used, but none of these schemes are efficient and multi-purpose [4]. Protecting the equipment that implementing the cryptographic algorithms against side-channel attacks is an important issue These attacks use computation time, power consumption, or electromagnetic radiations to extract sensitive information such as the keys. M. Jahanbani et al.: DPA Protected Implementation of OCB and COLM Authenticated Ciphers analysis (CPA) attack [6]. As our primer aim, we will show the vulnerability of these selected ciphers against side-channel attacks, the key recovery is not considered in this work This issue can be investigated using leakage detection methods such as the t-test. The protection costs are calculated and compared with others

ORGANIZATION The rest of the paper is organized as follows
BACKGROUND
PRACTICAL RESULTS
CONCLUSION AND FUTURE RESEARCH

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.