Cryptology ePrint Archive: Report 2016/481

Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori

Amir Moradi and Tobias Schneider

Abstract: During the last years, the industry sector showed particular interest in solutions which allow to encrypt and decrypt data within one clock cycle. Known as low-latency cryptography, such ciphers are desirable for pervasive applications with real-time security requirements. On the other hand, pervasive applications are very likely in control of the end user, and may operate in a hostile environment. Hence, in such scenarios it is necessary to provide security against side-channel analysis (SCA) attacks while still keeping the low-latency feature. Since the single-clock-cycle concept requires an implementation in a fully-unrolled fashion, the application of masking schemes - as the most widely studied countermeasure - is not straightforward. The contribution of this work is to present and discuss about the difficulties and challenges that hardware engineers face when integrating SCA countermeasures into low-latency constructions. In addition to several design architectures, practical evaluations, and discussions about the problems and potential solutions with respect to the case study PRINCE (also compared with Midori), the final message of this paper is a couple of suggestions for future low-latency designs to - hopefully - ease the integration of SCA countermeasures.

Category / Keywords: implementation / Side-Channel Analsysi, Masking, Threshold Implementation, PRINCE, Midori, Low Latency

Original Publication (with minor differences): IACR-ASIACRYPT-2016

Date: received 19 May 2016, last revised 21 Oct 2016

Contact author: amir moradi at rub de

Available format(s): PDF | BibTeX Citation

Version: 20161021:134937 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]