Paper 2016/481
Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori
Amir Moradi and Tobias Schneider
Abstract
During the last years, the industry sector showed particular interest in solutions which allow to encrypt and decrypt data within one clock cycle. Known as low-latency cryptography, such ciphers are desirable for pervasive applications with real-time security requirements. On the other hand, pervasive applications are very likely in control of the end user, and may operate in a hostile environment. Hence, in such scenarios it is necessary to provide security against side-channel analysis (SCA) attacks while still keeping the low-latency feature. Since the single-clock-cycle concept requires an implementation in a fully-unrolled fashion, the application of masking schemes - as the most widely studied countermeasure - is not straightforward. The contribution of this work is to present and discuss about the difficulties and challenges that hardware engineers face when integrating SCA countermeasures into low-latency constructions. In addition to several design architectures, practical evaluations, and discussions about the problems and potential solutions with respect to the case study PRINCE (also compared with Midori), the final message of this paper is a couple of suggestions for future low-latency designs to - hopefully - ease the integration of SCA countermeasures.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- A minor revision of an IACR publication in ASIACRYPT 2016
- DOI
- 10.1007/978-3-662-53887-6_19
- Keywords
- Side-Channel AnalsysiMaskingThreshold ImplementationPRINCEMidoriLow Latency
- Contact author(s)
- amir moradi @ rub de
- History
- 2016-10-21: last of 4 revisions
- 2016-05-20: received
- See all versions
- Short URL
- https://ia.cr/2016/481
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/481, author = {Amir Moradi and Tobias Schneider}, title = {Side-Channel Analysis Protection and Low-Latency in Action - case study of {PRINCE} and Midori}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/481}, year = {2016}, doi = {10.1007/978-3-662-53887-6_19}, url = {https://eprint.iacr.org/2016/481} }