Cryptology ePrint Archive: Report 2018/806

Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness

Victor Arribas and Svetla Nikova and Vincent Rijmen

Abstract: Recently the CAESAR competition has announced several finalists among the submitted authenticated encryption algorithms, after an open selection process during the last 5 years. Applications using these algorithms are rapidly increasing today. Devices implementing these applications are enormously susceptible to physical attacks, which are able to retrieve secret data through side-channel information such as the power consumption or the electromagnetic radiations. In this work we present a Side-Channel Analysis resistant hardware implementation of the whole family of authenticated encryption schemes KETJE. By changing just one parameter, any of the KETJE designs can be obtained, and tailored for different applications, either lightweight or high throughput. We introduce a new protected KECCAK implementation, as well as unprotected and protected KETJE implementations, which allow both encryption and decryption modes in the same module. In order to secure these implementations we make use of the masking scheme known as Threshold Implementations and complement it with the technique of “Changing of the Guards”, achieving a first-order Side-Channel Analysis protected implementation with zero extra randomness needed. This way, no dedicated PRNG needs to be additionally implemented, avoiding issues such as the security of the PRNG itself or the quality of the randomness.

Category / Keywords: implementation / Authenticated Encryption, KETJE, SHA-3, Side- Channel Analysis, Threshold Implementations, Changing of the guards.

Original Publication (in the same form): Euromicro DSD 2018

Date: received 31 Aug 2018, last revised 2 Sep 2018

Contact author: varribas at esat kuleuven be

Available format(s): PDF | BibTeX Citation

Version: 20180906:182034 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]