High Speed ASIC Implementations of Leakage-Resilient Cryptography

被引:0
|
作者
Schilling, Robert [1 ,2 ]
Unterluggauer, Thomas [1 ]
Mangard, Stefan [1 ]
Gurkaynak, Frank K. [3 ]
Muehlberghuber, Michael [3 ]
Benini, Luca [3 ]
机构
[1] Graz Univ Technol, Graz, Austria
[2] Know Ctr GmbH, Graz, Austria
[3] Swiss Fed Inst Technol, Integrated Syst Lab, Zurich, Switzerland
基金
欧洲研究理事会;
关键词
ASIC; cryptography; IoT; leakage resilience; security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Embedded devices in the Internet-of Things require encryption functionalities to secure their communication. However, side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations. While state-of-the-art countermeasures like masking slow down the performance and can only prevent DPA up to a certain order, leakage-resilient schemes are designed to stay secure even in the presence of side-channel leakage. Although several leakage resilient schemes have been proposed, there arc no hardware implementations to demonstrate their practicality and performance on measurable silicon. In this work, we present an ASIC implementation of a multi-core System-on-Chip extended with a software programmable accelerator for leakage-resilient cryptography. The accelerator is deeply embedded in the shared memory architecture of the many-core system, supports different configurations, contains a high throughput implementation of the 2PRG primitive based on AES-128, offers two side-channel protected re keying functions, and is the first fabricated design of the side-channel secure authenticated encryption scheme ISAP. The accelerator reaches a maximum throughput of 7.49 Gbit/s and a best-case energy efficiency of 137 Gbit/s/W making this accelerator suitable for highspeed secure IoT applications.
引用
收藏
页码:1259 / 1264
页数:6
相关论文
共 50 条
  • [21] Leakage-Resilient Coin Tossing
    Boyle, Elette
    Goldwasser, Shafi
    Kalai, Yael Tauman
    DISTRIBUTED COMPUTING, 2011, 6950 : 181 - +
  • [22] Fully Leakage-Resilient Signatures
    Boyle, Elette
    Segev, Gil
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 89 - +
  • [23] A Leakage-Resilient Mode of Operation
    Pietrzak, Krzysztof
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 462 - 482
  • [24] Fully Leakage-Resilient Signatures
    Elette Boyle
    Gil Segev
    Daniel Wichs
    Journal of Cryptology, 2013, 26 : 513 - 558
  • [25] Leakage-resilient coin tossing
    Boyle, Elette
    Goldwasser, Shafi
    Kalai, Yael Tauman
    DISTRIBUTED COMPUTING, 2014, 27 (03) : 147 - 164
  • [26] Fully Leakage-Resilient Codes
    Faonio, Antonio
    Nielsen, Jesper Buus
    PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT I, 2017, 10174 : 333 - 358
  • [27] Indistinguishable Leakage-Resilient Circuit Compiler
    Xu, Shiyou
    Wang, Jian
    Wang, Liangliang
    COMPUTER JOURNAL, 2023, 66 (07): : 1717 - 1732
  • [28] Leakage-Resilient Signatures with Graceful Degradation
    Nielsen, Jesper Buus
    Venturi, Daniele
    Zottarel, Angela
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 362 - 379
  • [29] Leakage-resilient Certificateless Signcryption Scheme
    Yang, Qiliang
    Thou, Yanwei
    Yu, Yong
    2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
  • [30] Limits of a conjecture on a leakage-resilient cryptosystem
    Galindo, David
    Vivek, Srinivas
    INFORMATION PROCESSING LETTERS, 2014, 114 (04) : 192 - 196