You are looking at a specific version 20190226:031818 of this paper. See the latest version.

Paper 2019/193

Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge

Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert

Abstract

Authenticated Encryption (AE) has become the de facto standard for encryption in modern protocols, and the ubiquitous deployment of small connected devices naturally calls for the availability of lightweight AE schemes, as reflected by a new standardisation process initiated by the NIST. Small devices do not only have a limited computational power: they are also targets of choice for side-channel attacks, and the ease of protecting against these attacks is therefore an important aspect of the selection criteria in this standardisation process. In this paper, we address this challenge by presenting a new AE mode, TETSponge, which carefully combines a tweakable block cipher with strong protections against side-channel attacks that only needs to be called twice per encryption and decryption, and a sponge-style permutation that only needs weak side-channel protections and is used to frugally process the message and associated data. TETSponge offers many desirable features: (i) it supports single-pass encryption and decryption, and is compatible with limited memory requirements, (ii) it offers black-box security as an AE mode, with good bounds, including in the multi-user setting, (iii) it offers strong resistance against side-channel attacks during both encryption and decryption, and guarantees nonce misuse-resilience. As such, we conclude that TETSponge offers an appealing option for the implementation of lightweight AE in settings where side-channel attacks are an actual concern. Along our way, we propose the first rigorous methodology that can be used to analyze the leakage-resilience of sponge-based constructions.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
Authenticated EncryptionDuplex ConstructionLeakage-ResilienceLeveled ImplementationsMulti-UserBeyond Birthday Security.
Contact author(s)
chun guo @ uclouvain be
History
2019-08-14: last of 3 revisions
2019-02-26: received
See all versions
Short URL
https://ia.cr/2019/193
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.