Evaluating the ROCKY Countermeasure for Side-Channel Leakage

被引:1
|
作者
Miteloudi, Konstantina [1 ]
Chmielewski, Lukasz [1 ]
Batina, Lejla [1 ]
Mentens, Nele [2 ,3 ,4 ]
机构
[1] Radboud Univ Nijmegen, Digital Secur Grp, Nijmegen, Netherlands
[2] Leiden Univ, LIACS, Leiden, Netherlands
[3] Katholieke Univ Leuven, imec COSIC, Leuven, Belgium
[4] Katholieke Univ Leuven, ESAT, ES&S, Leuven, Belgium
关键词
Xoodyak; ROCKY; side-channel attacks; fault attacks; FPGA; CIPHER;
D O I
10.1109/VLSI-SoC53125.2021.9606973
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
ROCKY is a recently introduced countermeasure against fault attacks for authenticated encryption algorithms. It is based on the random rotation of the internal state. In this work, we evaluate the effectiveness of ROCKY as a countermeasure against side-channel attacks. We implement four different types of FPGA-oriented architectures of Xoodoo: an unprotected version and three different versions protected with ROCKY. Xoodoo is used as round function of Xoodyak, which is a scheme in the NIST lightweight cryptography standardization competition. For the experimental setup, the SAKURA-G target board with Spartan-6 FPGA is used. The evaluation of the results is done through test vector leakage assessment (TVLA). This is the first work looking into the side-channel security of the ROCKY countermeasure.
引用
收藏
页码:212 / 217
页数:6
相关论文
共 50 条
  • [31] Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures
    Pessl, Peter
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016, 2016, 10095 : 153 - 170
  • [32] AES side-channel countermeasure using random tower field constructions
    Alexis Bonnecaze
    Pierre Liardet
    Alexandre Venelli
    Designs, Codes and Cryptography, 2013, 69 : 331 - 349
  • [33] All-or-Nothing Transforms as a countermeasure to differential side-channel analysis
    Robert P. McEvoy
    Michael Tunstall
    Claire Whelan
    Colin C. Murphy
    William P. Marnane
    International Journal of Information Security, 2014, 13 : 291 - 304
  • [34] Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure
    Brisfors, Martin
    Moraitis, Michail
    Landin, Gabriel Klasson
    Jilborg, Truls
    FOUNDATIONS AND PRACTICE OF SECURITY, PT I, FPS 2023, 2024, 14551 : 372 - 387
  • [35] Side-channel attack countermeasure evaluation of cryptographic hardware implementation circuit
    Asai, Toshiya
    Asahi, Kensaku
    Shiozaki, Mitsuru
    Fujino, Takeshi
    Yoshikawa, Masaya
    IEEJ Transactions on Electronics, Information and Systems, 2014, 134 (12) : 1767 - 1774
  • [36] Side-Channel Leakage Detection Based on Constant Parameter Channel Model
    Yang, Wei
    Zhang, Hailong
    Gao, Yansong
    Fu, Anmin
    Wei, Songjie
    2020 IEEE 38TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2020), 2020, : 553 - 560
  • [37] Late Breaking Results: Configurable Ring Oscillators as a Side-Channel Countermeasure
    Nassar, Hassan
    Pankner, Simon
    Bauer, Lars
    Henkel, Joerg
    2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC, 2023,
  • [38] Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature
    Fukushima, Kazuhide
    Okada, Hiroki
    Takarabt, Sofiane
    Korchi, Amina
    Hamoud, Meziane
    Karray, Khaled
    Souissy, Youssef
    Guilley, Sylvain
    SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 701 - 706
  • [39] Side-Channel Information Leakage of Traffic Data in Instant Messaging
    Li, Ke
    Li, Hong
    Zhu, Hongsong
    Sun, Limin
    Wen, Hui
    2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2019,
  • [40] Preprocessing of the Physical Leakage Information to Combine Side-Channel Distinguishers
    Seckiner, Soner
    Kose, Selcuk
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (12) : 2052 - 2063