Paper 2019/954

CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme

Mohsen Jahanbani, Zeinolabedin Norouzi, and Nasour Bagheri


Authenticated encryption schemes provide both confidentiality and integrity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, like all physical implementations of any cryptographic system. In this paper, for the first time, a three-steps CPA attack against COLM, one of the winners of CAESAR, is presented to indicate its vulnerability. For this purpose, in this research paper, this authenticated encryption scheme is implemented on the FPGA of the SAKURA-G board and, by measuring and collecting 1,800 power traces, a successful CPA attack with zero value power model has been mounted on it. In addition, a protected hardware architecture for the COLM is proposed to make this design secure against first-order CPA attacks. To this end, a domain-oriented masking (DOM) scheme with two inputs/outputs share is used to protect the COLM. To verify the security of these countermeasures, we mounted a first and second-order CPA attack and a non-specified t-test on the protected COLM.

Available format(s)
Publication info
Preprint. Minor revision.
Authenticated CipherCOLMCPADOMMasking.
Contact author(s)
na bagheri @ gmail com
mo jahanbani2009 @ gmail com
2019-08-21: received
Short URL
Creative Commons Attribution


      author = {Mohsen Jahanbani and Zeinolabedin Norouzi and Nasour Bagheri},
      title = {CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme},
      howpublished = {Cryptology ePrint Archive, Paper 2019/954},
      year = {2019},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.