FPGA implementations of SPRING and their countermeasures against side-channel attacks

被引:7
作者
Brenner, Hai [1 ]
Gaspar, Lubos [2 ]
Leurent, Gaëetan [3 ]
Rosen, Alon [1 ]
Standaert, François-Xavier [2 ]
机构
[1] Interdisciplinary Center, Herzliya
[2] ICTEAM/ELEN/Crypto Group, Université catholique de Louvain
[3] Inria, EPI SECRET, Rocquencourt
来源
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014年 / 8731卷
基金
欧洲研究理事会;
关键词
All Open Access; Bronze;
D O I
10.1007/978-3-662-44709-3_23
中图分类号
学科分类号
摘要
SPRING is a family of pseudo-random functions that aims to combine the guarantees of security reductions with good performance on a variety of platforms. Preliminary software implementations for smallparameter instantiations of SPRING were proposed at FSE 2014, and have been demonstrated to reach throughputs within small factors of those of AES. In this paper, we complement these results and investigate the hardware design space of these types of primitives. Our first (pragmatic) contribution is the first FPGA implementation of SPRING in a counter-like mode. We show that the “rounded product” operations in our design can be computed efficiently, reaching throughputs in the hundreds of megabits/second range within only 4% of the resources of a modern (Xilinx Virtex-6) reconfigurable device. Our second (more prospective) contribution is to discuss the properties of SPRING hardware implementations for side-channel resistance. We show that a part of the design can be very efficiently masked (with linear overhead), while another part implies quadratic overhead due to non-linear operations (similarly to what is usually observed, e.g., for block ciphers). Yet, we argue that for this second part of the design, resistance against “simple power analysis” may be sufficient to obtain concrete implementation security. We suggest ways to reach this goal very efficiently, via shuffling. We believe that such hybrid implementations, where each part of the design is protected with adequate solutions, is a promising topic for further investigation. © International Association for Cryptologic Research 2014.
引用
收藏
页码:414 / 432
页数:18
相关论文
共 34 条
[1]  
Alberini G., Rosen A., Efficient Rounding Procedures of Biased Samples, Manuscript, (2013)
[2]  
Andreeva E., Bogdanov A., Dodis Y., Mennink B., Steinberger J.P., On the Indifferentiability of Key-Alternating Ciphers, CRYPTO 2013, 8042, pp. 531-550, (2013)
[3]  
Banerjee A., Brenner H., Leurent G., Peikert C., Rosen A., SPRING: Fast Pseudorandom Functions from Rounded Ring Products, FSE 2014
[4]  
Banerjee A., Peikert C., Rosen A., Pseudorandom Functions and Lattices, EUROCRYPT 2012, 7237, pp. 719-737, (2012)
[5]  
Bogdanov A., Knudsen L.R., Leander G., Standaert F.-X., Steinberger J., Tischhauser E., Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations, EUROCRYPT 2012, 7237, pp. 45-62, (2012)
[6]  
Chen S., Steinberger J.P., Tight security bounds for key-alternating ciphers, IACR Cryptology ePrint Archive, 2013, (2013)
[7]  
Coron J.S., Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems, CHES 1999, 1717, pp. 292-302, (1999)
[8]  
Coron J.S., Giraud C., Prouff E., Renner S., Rivain M., Vadnala P.K., Conversion of Security Proofs from One Leakage Model to Another: A New Issue, COSADE 2012, 7275, pp. 69-81, (2012)
[9]  
UCL, Louvain-la-Neuve
[10]  
Gaspar L., Leurent G., Standaert F.X., Hardware Implementation and Side- Channel Analysis of Lapin, CT-RSA 2014, 8366, pp. 206-226, (2014)