Paper 2017/1193

Rhythmic Keccak: SCA Security and Low Latency in HW

Victor Arribas, Begül Bilgin, George Petrides, Svetla Nikova, and Vincent Rijmen

Abstract

Glitches entail a great issue when securing a cryptographic implementation in hardware. Several masking schemes have been proposed in the literature that provide security even in the presence of glitches. The key property that allows this protection was introduced in threshold implementations as non-completeness. We address crucial points to ensure the right compliance of this property especially for low-latency implementations. Specifically, we first discuss the existence of a flaw in DSD 2017 implementation of Keccak by Gross et al. in violation of the non-completeness property and propose a solution. We perform a side-channel evaluation on the first-order and second-order implementations of the proposed design where no leakage is detected with up to 55 million traces. Then, we present a method to ensure a non-complete scheme of an unrolled implementation applicable to any order of security or algebraic degree of the shared function. By using this method we design a two-rounds unrolled first-order Keccak-f [200] implementation that completes an encryption in 20.61ns, the fastest implementation in the literature to this date.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
A minor revision of an IACR publication in TCHES 2018
DOI
10.13154/tches.v2018.i1.269-290
Keywords
Glitchnon-completenessthreshold implementationconsolidated masking schemedomain-oriented masking
Contact author(s)
varribas @ esat kuleuven be
bbilgin @ esat kuleuven be
g petrides @ eclatent com
Svetla Nikova @ esat kuleuven be
vincent rijmen @ esat kuleuven be
History
2019-05-24: revised
2017-12-18: received
See all versions
Short URL
https://ia.cr/2017/1193
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2017/1193,
      author = {Victor Arribas and Begül Bilgin and George Petrides and Svetla Nikova and Vincent Rijmen},
      title = {Rhythmic Keccak: SCA Security and Low Latency in HW},
      howpublished = {Cryptology ePrint Archive, Paper 2017/1193},
      year = {2017},
      doi = {10.13154/tches.v2018.i1.269-290},
      note = {\url{https://eprint.iacr.org/2017/1193}},
      url = {https://eprint.iacr.org/2017/1193}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.