Evaluating the ROCKY Countermeasure for Side-Channel Leakage

被引:1
|
作者
Miteloudi, Konstantina [1 ]
Chmielewski, Lukasz [1 ]
Batina, Lejla [1 ]
Mentens, Nele [2 ,3 ,4 ]
机构
[1] Radboud Univ Nijmegen, Digital Secur Grp, Nijmegen, Netherlands
[2] Leiden Univ, LIACS, Leiden, Netherlands
[3] Katholieke Univ Leuven, imec COSIC, Leuven, Belgium
[4] Katholieke Univ Leuven, ESAT, ES&S, Leuven, Belgium
关键词
Xoodyak; ROCKY; side-channel attacks; fault attacks; FPGA; CIPHER;
D O I
10.1109/VLSI-SoC53125.2021.9606973
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
ROCKY is a recently introduced countermeasure against fault attacks for authenticated encryption algorithms. It is based on the random rotation of the internal state. In this work, we evaluate the effectiveness of ROCKY as a countermeasure against side-channel attacks. We implement four different types of FPGA-oriented architectures of Xoodoo: an unprotected version and three different versions protected with ROCKY. Xoodoo is used as round function of Xoodyak, which is a scheme in the NIST lightweight cryptography standardization competition. For the experimental setup, the SAKURA-G target board with Spartan-6 FPGA is used. The evaluation of the results is done through test vector leakage assessment (TVLA). This is the first work looking into the side-channel security of the ROCKY countermeasure.
引用
收藏
页码:212 / 217
页数:6
相关论文
共 50 条
  • [21] Side-Channel Leakage Analysis of Inner Product Masking
    Li, Yuyuan
    Li, Lang
    Ou, Yu
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 79 (01): : 1245 - 1262
  • [22] Evaluating side-channel information leakage in 3DES using the t-test
    Chen J.
    Li H.
    Wang Y.
    Wang Y.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2016, 56 (05): : 499 - 503
  • [23] A New Countermeasure against Scan-Based Side-Channel Attacks
    Luo, Yanhui
    Cui, Aijiao
    Qu, Gang
    Li, Huawei
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 1722 - 1725
  • [24] Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks
    Bhasin, Shivam
    Guilley, Sylvain
    Sauvage, Laurent
    Danger, Jean-Luc
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 195 - 207
  • [25] First-Order Side-Channel Attacks on the Permutation Tables Countermeasure
    Prouff, Emmanuel
    McEvoy, Robert
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 81 - 96
  • [26] Key Update Countermeasure for Correlation-Based Side-Channel Attacks
    Yutian Gui
    Suyash Mohan Tamore
    Ali Shuja Siddiqui
    Fareena Saqib
    Journal of Hardware and Systems Security, 2020, 4 (3) : 167 - 179
  • [27] Power Profile Equalizer: a Lightweight Countermeasure against Side-channel Attack
    Wang, Chenguang
    Yan, Ming
    Cai, Yici
    Zhou, Qiang
    Yang, Jianlei
    2017 IEEE 35TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2017, : 305 - 312
  • [28] Electromagnetic Equalizer: An Active Countermeasure Against EM Side-channel Attack
    Wang, Chenguang
    Cai, Yici
    Wang, Haoyi
    Zhou, Qiang
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [29] All-or-Nothing Transforms as a countermeasure to differential side-channel analysis
    McEvoy, Robert P.
    Tunstall, Michael
    Whelan, Claire
    Murphy, Colin C.
    Marnane, William P.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (03) : 291 - 304
  • [30] AES side-channel countermeasure using random tower field constructions
    Bonnecaze, Alexis
    Liardet, Pierre
    Venelli, Alexandre
    DESIGNS CODES AND CRYPTOGRAPHY, 2013, 69 (03) : 331 - 349