首页> 外文期刊>Microprocessors and microsystems >Guards in action: First-order SCA secure implementations of KETJE without additional randomness
【24h】

Guards in action: First-order SCA secure implementations of KETJE without additional randomness

机译:行动中的警卫:​​KETJE的一阶SCA安全实现,没有额外的随机性

获取原文
获取原文并翻译 | 示例

摘要

Recently the CAESAR competition has announced several finalists among the submitted authenticated encryption algorithms, after an open selection process during the last five years. Applications using these algorithms are rapidly increasing today. Devices implementing these applications are enormously susceptible to physical attacks, which are able to retrieve secret data through side-channel information such as power consumption or the electromagnetic radiations. In this work, we present a Side-Channel Analysis resistant hardware implementation of the whole family of authenticated encryption schemes KETJE. By changing just one parameter, any of the KETJE designs can be obtained, and tailored for different applications, either lightweight or high throughput.We introduce a new protected KECCAK implementation, as well as unprotected and protected KETJE implementations, which allow both encryption and decryption modes in the same module. In order to secure these implementations we make use of the masking scheme known as Threshold Implementations and complement it with the technique of "Changing of the Guards", achieving a first-order Side-Channel Analysis protected implementation with zero extra randomness needed. This way, no dedicated PRNG needs to be additionally implemented, avoiding issues such as the security of the PRNG itself or the quality of the randomness. We elaborate on the importance of the input dependencies and how the addition of linear blocks could thwart the security provided by a correctly protected module. This is of special importance when extending KECCAKto implement KETJE. Furthermore, we provide an empirical evaluation of both KECCAKand KETJEimplementations, demonstrating how with our methodology we can construct a secure KETJEbased on a previously secured KECCAK. (C) 2019 Elsevier B.V. All rights reserved.
机译:最近的CAESAR竞赛在过去五年的公开选拔过程中,已经公布了经过认证的加密算法中的几项决赛入围者。如今,使用这些算法的应用程序正在迅速增加。实现这些应用程序的设备极易受到物理攻击的攻击,这些攻击能够通过诸如功耗或电磁辐射之类的侧信道信息检索秘密数据。在这项工作中,我们介绍了经过身份验证的加密方案KETJE整个系列的抗侧面通道分析的硬件实现。仅需更改一个参数,即可获得任何KETJE设计,并针对轻量或高吞吐量的不同应用进行量身定制。我们引入了一种新的受保护的KECCAK实现,以及不受保护和受保护的KETJE实现,从而允许加密和解密相同模块中的模式。为了确保这些实现的安全,我们使用称为“阈值实现”的屏蔽方案,并使用“更改警卫队”的技术对其进行补充,从而实现了一阶边信道分析保护的实现,且所需零额外随机性。这样,无需额外实施专用的PRNG,避免了PRNG本身的安全性或随机性等问题。我们详细介绍了输入依存关系的重要性,以及线性块的添加如何阻碍正确保护的模块所提供的安全性。在扩展KECCAK以实现KETJE时,这尤其重要。此外,我们提供了对KECCAK和KETJE实施的实证评估,展示了我们的方法如何基于先前安全的KECCAK构建安全的KETJE。 (C)2019 Elsevier B.V.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号