FPGA implementations of SPRING and their countermeasures against side-channel attacks

被引:7
作者
Brenner, Hai [1 ]
Gaspar, Lubos [2 ]
Leurent, Gaëetan [3 ]
Rosen, Alon [1 ]
Standaert, François-Xavier [2 ]
机构
[1] Interdisciplinary Center, Herzliya
[2] ICTEAM/ELEN/Crypto Group, Université catholique de Louvain
[3] Inria, EPI SECRET, Rocquencourt
来源
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014年 / 8731卷
基金
欧洲研究理事会;
关键词
All Open Access; Bronze;
D O I
10.1007/978-3-662-44709-3_23
中图分类号
学科分类号
摘要
SPRING is a family of pseudo-random functions that aims to combine the guarantees of security reductions with good performance on a variety of platforms. Preliminary software implementations for smallparameter instantiations of SPRING were proposed at FSE 2014, and have been demonstrated to reach throughputs within small factors of those of AES. In this paper, we complement these results and investigate the hardware design space of these types of primitives. Our first (pragmatic) contribution is the first FPGA implementation of SPRING in a counter-like mode. We show that the “rounded product” operations in our design can be computed efficiently, reaching throughputs in the hundreds of megabits/second range within only 4% of the resources of a modern (Xilinx Virtex-6) reconfigurable device. Our second (more prospective) contribution is to discuss the properties of SPRING hardware implementations for side-channel resistance. We show that a part of the design can be very efficiently masked (with linear overhead), while another part implies quadratic overhead due to non-linear operations (similarly to what is usually observed, e.g., for block ciphers). Yet, we argue that for this second part of the design, resistance against “simple power analysis” may be sufficient to obtain concrete implementation security. We suggest ways to reach this goal very efficiently, via shuffling. We believe that such hybrid implementations, where each part of the design is protected with adequate solutions, is a promising topic for further investigation. © International Association for Cryptologic Research 2014.
引用
收藏
页码:414 / 432
页数:18
相关论文
共 34 条
[11]  
Genelle L., Prouff E., Quisquater M., Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings, CHES 2011. LNCS, 6917, pp. 240-255, (2011)
[12]  
Genelle L., Prouff E., Quisquater M., Thwarting higher-order side channel analysis with additive and multiplicative maskings, CHES 2011. LNCS, 6917, pp. 240-255, (2011)
[13]  
Ghodosi H., Pieprzyk J., Steinfeld R., Multi-party computation with conversion of secret sharing, Designs, 62, 3, pp. 259-272, (2012)
[14]  
Grosso V., Standaert F.X., Faust S., Masking vs. Multiparty Computation: How Large Is the Gap for AES?, CHES 2013. LNCS, 8086, pp. 400-416, (2013)
[15]  
Herbst C., Oswald E., Mangard S., An AES Smart Card Implementation Resistant to Power Analysis Attacks, ACNS 2006. LNCS, 3989, pp. 239-252, (2006)
[16]  
Joye M., Yen S.M., The Montgomery Powering Ladder, CHES 2002. LNCS, 2523, pp. 291-302, (2003)
[17]  
Lampe R., Patarin J., Seurin Y., An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher, 34, pp. 278-295
[18]  
Lampe R., Seurin Y., How to Construct an Ideal Cipher from a Small Set of Public Permutations, ASIACRYPT 2013, Part I. LNCS, 8269, pp. 444-463, (2013)
[19]  
Lyubashevsky V., Micciancio D., Peikert C., Rosen A., SWIFFT: A Modest Proposal for FFT Hashing, FSE 2008. LNCS, 5086, pp. 54-72, (2008)
[20]  
Lyubashevsky V., Peikert C., Regev O., On Ideal Lattices and Learning with Errors over Rings, EUROCRYPT 2010. LNCS, 6110, pp. 1-23, (2010)