Paper 2018/806
Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness
Victor Arribas, Svetla Nikova, and Vincent Rijmen
Abstract
Recently the CAESAR competition has announced several finalists among the submitted authenticated encryption algorithms, after an open selection process during the last 5 years. Applications using these algorithms are rapidly increasing today. Devices implementing these applications are enormously susceptible to physical attacks, which are able to retrieve secret data through side-channel information such as the power consumption or the electromagnetic radiations. In this work we present a Side-Channel Analysis resistant hardware implementation of the whole family of authenticated encryption schemes KETJE. By changing just one parameter, any of the KETJE designs can be obtained, and tailored for different applications, either lightweight or high throughput. We introduce a new protected KECCAK implementation, as well as unprotected and protected KETJE implementations, which allow both encryption and decryption modes in the same module. In order to secure these implementations we make use of the masking scheme known as Threshold Implementations and complement it with the technique of “Changing of the Guards”, achieving a first-order Side-Channel Analysis protected implementation with zero extra randomness needed. This way, no dedicated PRNG needs to be additionally implemented, avoiding issues such as the security of the PRNG itself or the quality of the randomness.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. Euromicro DSD 2018
- Keywords
- Authenticated EncryptionKETJESHA-3Side- Channel AnalysisThreshold ImplementationsChanging of the guards.
- Contact author(s)
- varribas @ esat kuleuven be
- History
- 2018-09-06: received
- Short URL
- https://ia.cr/2018/806
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2018/806, author = {Victor Arribas and Svetla Nikova and Vincent Rijmen}, title = {Guards in Action: First-Order {SCA} Secure Implementations of Ketje without Additional Randomness}, howpublished = {Cryptology {ePrint} Archive, Paper 2018/806}, year = {2018}, url = {https://eprint.iacr.org/2018/806} }