Side-channel Resistant Implementations of a Novel Lightweight Authenticated Cipher with Application to Hardware Security
Autor: | Jens-Peter Kaps, Sammy Lin, Farnoud Farahmand, Abubakr Abdulgadir, Kris Gaj |
---|---|
Rok vydání: | 2021 |
Předmět: |
Hardware security module
Computer science 05 social sciences Overhead (engineering) 050801 communication & media studies 02 engineering and technology Computer security computer.software_genre law.invention Obfuscation (software) 0508 media and communications Cipher law 0202 electrical engineering electronic engineering information engineering NIST 020201 artificial intelligence & image processing Side channel attack Cryptanalysis computer Key exchange |
Zdroj: | ACM Great Lakes Symposium on VLSI |
DOI: | 10.1145/3453688.3461761 |
Popis: | Lightweight authenticated ciphers are crucial in many resource-constrained applications, including hardware security. To protect Intellectual Property (IPs) from theft and reverse-engineering, multiple obfuscation methods have been developed. An essential component of such schemes is the need for secrecy and authenticity of the obfuscation keys. Such keys may need to be exchanged through the unprotected channels, and their recovery attempted using side-channel attacks. However, the use of the current AES-GCM standard to protected key exchange requires a substantial area and power overhead. NIST is currently coordinating a standardization process to select lightweight algorithms for resource-constrained applications. Although security against cryptanalysis is paramount, cost, performance, and resistance to side-channel attacks are among the most important selection criteria. Since the cost of protection against side-channel attacks is a function of the algorithm, quantifying this cost is necessary for estimating its cost and performance in real-world applications. In this work, we investigate side-channel resistant lightweight implementations of an authenticated cipher TinyJAMBU, one of ten finalists in the current NIST LWC standardization process. Our results demonstrate that these implementations achieve robust security against side-channel attacks while keeping the area and power consumption significantly lower than it is possible using the current standards. |
Databáze: | OpenAIRE |
Externí odkaz: |