High Speed ASIC Implementations of Leakage-Resilient Cryptography

被引:0
作者
Schilling, Robert [1 ,2 ]
Unterluggauer, Thomas [1 ]
Mangard, Stefan [1 ]
Gurkaynak, Frank K. [3 ]
Muehlberghuber, Michael [3 ]
Benini, Luca [3 ]
机构
[1] Graz Univ Technol, Graz, Austria
[2] Know Ctr GmbH, Graz, Austria
[3] Swiss Fed Inst Technol, Integrated Syst Lab, Zurich, Switzerland
来源
PROCEEDINGS OF THE 2018 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE) | 2018年
基金
欧洲研究理事会;
关键词
ASIC; cryptography; IoT; leakage resilience; security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Embedded devices in the Internet-of Things require encryption functionalities to secure their communication. However, side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations. While state-of-the-art countermeasures like masking slow down the performance and can only prevent DPA up to a certain order, leakage-resilient schemes are designed to stay secure even in the presence of side-channel leakage. Although several leakage resilient schemes have been proposed, there arc no hardware implementations to demonstrate their practicality and performance on measurable silicon. In this work, we present an ASIC implementation of a multi-core System-on-Chip extended with a software programmable accelerator for leakage-resilient cryptography. The accelerator is deeply embedded in the shared memory architecture of the many-core system, supports different configurations, contains a high throughput implementation of the 2PRG primitive based on AES-128, offers two side-channel protected re keying functions, and is the first fabricated design of the side-channel secure authenticated encryption scheme ISAP. The accelerator reaches a maximum throughput of 7.49 Gbit/s and a best-case energy efficiency of 137 Gbit/s/W making this accelerator suitable for highspeed secure IoT applications.
引用
收藏
页码:1259 / 1264
页数:6
相关论文
共 17 条
  • [1] Belaid S., 2014, ADV CRYPTOLOGY ASIAC
  • [2] Improved Side-Channel Analysis of Finite-Field Multiplication
    Belaid, Sonia
    Coron, Jean-Sebastien
    Fouque, Pierre-Alain
    Gerard, Benoit
    Kammerer, Jean-Gabriel
    Prouff, Emmanuel
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 395 - 415
  • [3] Comb to Pipeline: Fast Software Encryption Revisited
    Bogdanov, Andrey
    Lauridsen, Martin M.
    Tischhauser, Dinar
    [J]. FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 150 - 171
  • [4] Dobraunig C., 2017, IACR T SYMMETRIC CRY
  • [5] Dobraunig C., 2014, SMART CARD RES ADV A
  • [6] Dobraunig C., 2015, SMART CARD RES ADV A
  • [7] Faust S., 2012, CRYPTOGRAPHIC HARDWA
  • [8] Francois-Xavier Standaert, 2010, HARDWARE INTRINSIC S, P99
  • [9] Goldreich O., 1986, J ACM
  • [10] Guo Q., 2016, IACR CRYPTOLOGY EPRI