Cryptology ePrint Archive: Report 2019/954

CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme

Mohsen Jahanbani and Zeinolabedin Norouzi and Nasour Bagheri

Abstract: Authenticated encryption schemes provide both confidentiality and integrity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, like all physical implementations of any cryptographic system. In this paper, for the first time, a three-steps CPA attack against COLM, one of the winners of CAESAR, is presented to indicate its vulnerability. For this purpose, in this research paper, this authenticated encryption scheme is implemented on the FPGA of the SAKURA-G board and, by measuring and collecting 1,800 power traces, a successful CPA attack with zero value power model has been mounted on it. In addition, a protected hardware architecture for the COLM is proposed to make this design secure against first-order CPA attacks. To this end, a domain-oriented masking (DOM) scheme with two inputs/outputs share is used to protect the COLM. To verify the security of these countermeasures, we mounted a first and second-order CPA attack and a non-specified t-test on the protected COLM.

Category / Keywords: implementation / Authenticated Cipher; COLM; CPA;DOM; Masking.

Date: received 21 Aug 2019

Contact author: na bagheri at gmail com,mo jahanbani2009@gmail com

Available format(s): PDF | BibTeX Citation

Version: 20190821:214811 (All versions of this report)

Short URL: ia.cr/2019/954


[ Cryptology ePrint archive ]