Paper 2018/806

Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness

Victor Arribas, Svetla Nikova, and Vincent Rijmen

Abstract

Recently the CAESAR competition has announced several finalists among the submitted authenticated encryption algorithms, after an open selection process during the last 5 years. Applications using these algorithms are rapidly increasing today. Devices implementing these applications are enormously susceptible to physical attacks, which are able to retrieve secret data through side-channel information such as the power consumption or the electromagnetic radiations. In this work we present a Side-Channel Analysis resistant hardware implementation of the whole family of authenticated encryption schemes KETJE. By changing just one parameter, any of the KETJE designs can be obtained, and tailored for different applications, either lightweight or high throughput. We introduce a new protected KECCAK implementation, as well as unprotected and protected KETJE implementations, which allow both encryption and decryption modes in the same module. In order to secure these implementations we make use of the masking scheme known as Threshold Implementations and complement it with the technique of “Changing of the Guards”, achieving a first-order Side-Channel Analysis protected implementation with zero extra randomness needed. This way, no dedicated PRNG needs to be additionally implemented, avoiding issues such as the security of the PRNG itself or the quality of the randomness.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Euromicro DSD 2018
Keywords
Authenticated EncryptionKETJESHA-3Side- Channel AnalysisThreshold ImplementationsChanging of the guards.
Contact author(s)
varribas @ esat kuleuven be
History
2018-09-06: received
Short URL
https://ia.cr/2018/806
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2018/806,
      author = {Victor Arribas and Svetla Nikova and Vincent Rijmen},
      title = {Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness},
      howpublished = {Cryptology ePrint Archive, Paper 2018/806},
      year = {2018},
      note = {\url{https://eprint.iacr.org/2018/806}},
      url = {https://eprint.iacr.org/2018/806}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.