You are looking at a specific version 20190227:030023 of this paper. See the latest version.

Paper 2019/210

CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks

Christof Beierle and Gregor Leander and Amir Moradi and Shahram Rasoolzadeh

Abstract

Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of cryptanalytic security. This picture has been changed by the introduction of PICARO, ZORRO, and FIDES, where efficient protection against Side-Channel Analysis (SCA) attacks has been considered in their design. In this work we present the tweakable block cipher CRAFT: the efficient protection of its implementations against Differential Fault Analysis (DFA) attacks has been one of the main design criteria, while we provide strong bounds for its security in the related-tweak model. Considering the area footprint of round-based hardware implementations, CRAFT outperforms the other lightweight ciphers with the same state and key size. This holds not only for unprotected implementations but also when fault-detection facilities, side-channel protection, and their combination are integrated into the implementation. In addition to supporting a 64-bit tweak, CRAFT has the additional property that the circuit realizing the encryption can support the decryption functionality as well with very little area overhead.

Metadata
Available format(s)
PDF
Publication info
Published by the IACR in TOSC 2019 ISSUE 1
Keywords
CRAFTblock ciphertweakablelightweightfault detectioninvolutory
Contact author(s)
christof beierle @ rub de
gregor leander @ rub de
amir moradi @ rub de
shahram rasoolzadeh @ rub de
History
2020-02-10: last of 3 revisions
2019-02-27: received
See all versions
Short URL
https://ia.cr/2019/210
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.