HANMRE - An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches

被引:7
|
作者
Song Dat Phuc Tran [1 ]
Seok, Byoungjin [1 ]
Lee, Changhoon [1 ]
机构
[1] Seoul Natl Univ Sci & Technol, Dept Comp Sci & Engn, Seoul 01811, South Korea
关键词
Authenticated encryption; AEAD; Side-channel attacks; Sponge construction; Fresh re-keying; Leakage resilience; FAULT ATTACKS; ISAP;
D O I
10.1016/j.asoc.2020.106663
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Side-channel threat is a form of cryptanalysis that takes advantage of secret information leaked during program implementations, through measurement and evaluation of systematic parameters, such as execution time, power consumption and electromagnetic field (EMF) radiation. Since various sidechannel analysis techniques have applied successfully in gathering data and extracting cryptographic keys on variety of devices and platforms, including smartphones, smart cards, tablets, TVs, FPGAs and CPUs, these attacks constitute a significant risk to the security of cryptographic systems. Eliminating serious leakages is a major approach to mitigate side-channel vulnerabilities, in particular Simple Power Analysis (SPA) and Differential Power Analysis (DPA). During the last decade, several research aimed at securing cryptographic primitive algorithms against side-channel attacks, and validating possible countermeasures under assumption which its computational complexity can be estimated precisely. In this paper, we propose a hash-based authenticated nonce-misuse resistant encryption, namely HANMRE which is adaptable for a lightweight leakage resilient authenticated encryption with associated data (AEAD) scheme. The HANMRE construction has been designed for the sidechannel security achievement (including SPA and DPA attacks) and highly integrated for restrained environments with limited resource. The advantage of this scheme is ensuring the strong security developed in misuse-resistant schemes against general adversaries for authenticated encryption [1]. It also presents reasonable implementation results (especially long message handling) compared to existing authenticated encryption schemes and is expected to be a novel idea for better approaches of authenticated encryption mechanisms design in the future. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Securing designs against scan-based side-channel attacks
    Lee, Jeremy
    Tehranipoor, Mohammad
    Patel, Chintan
    Plusquellic, Jim
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) : 325 - 336
  • [32] Protecting Shared Virtualized Environments against Cache Side-channel Attacks
    Albalawi, Abdullah
    Vassilakis, Vassilios G.
    Calinescu, Radu
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 507 - 514
  • [33] Improving side-channel attacks against pairing-based cryptography
    Jauvart, Damien
    El Mrabet, Nadia
    Fournier, Jacques J. A.
    Goubin, Louis
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (01) : 1 - 16
  • [34] FourQ on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks
    Liu, Zhe
    Longa, Patrick
    Pereira, Geovandro C. C. F.
    Reparaz, Oscar
    Seo, Hwajeong
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 : 665 - 686
  • [35] On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks
    Dabosville, Guillaume
    Maghrebi, Houssem
    Lhuillery, Alexis
    Le, Thanh-Ha
    Bringer, Julien
    2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 214 - 221
  • [36] Improving side-channel attacks against pairing-based cryptography
    Damien Jauvart
    Nadia El Mrabet
    Jacques J. A. Fournier
    Louis Goubin
    Journal of Cryptographic Engineering, 2020, 10 : 1 - 16
  • [37] Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces
    Jimale, Mohamud Ahmed
    Z'aba, Muhammad Reza
    Kiah, Miss Laiha Binti Mat
    Idris, Mohd Yamani Idna
    Jamil, Norziana
    Mohamad, Moesfa Soeheila
    Rohmad, Mohd Saufy
    IEEE ACCESS, 2022, 10 : 50819 - 50838
  • [38] Fast Side-Channel Security Evaluation of ECC Implementations Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder
    Azouaoui, Melissa
    Poussier, Romain
    Standaert, Francois-Xavier
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 25 - 42
  • [39] Using Virtual Secure Circuit to Protect Embedded Software from Side-Channel Attacks
    Chen, Zhimin
    Sinha, Ambuj
    Schaumont, Patrick
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (01) : 124 - 136
  • [40] Protecting Cryptographic Libraries Against Side-Channel and Code-Reuse Attacks
    Tsoupidi, Rodothea Myrsini
    Troubitsyna, Elena
    Papadimitratos, Panos
    IEEE SECURITY & PRIVACY, 2024, : 2 - 11