Narrow your search

Library

KU Leuven (2)


Resource type

dissertation (2)


Language

English (2)


Year
From To Submit

2021 (1)

2018 (1)

Listing 1 - 2 of 2
Sort by

Dissertation
Protecting Keccak against combined side-channel and fault attacks

Loading...
Export citation

Choose an application

Bookmark

Abstract

When deployed in a potentially hostile environment, security-critical devices are susceptible to physical attacks. In particular, an adversary can mount devastating attacks by exploiting the side-channel leakage of a device or by actively introducing faults in the cryptographic computations. Countering these threats constitutes an active research topic. In contrast to side-channel countermeasures, of which the security properties are well understood, the literature surrounding fault attack resistance is much less developed. Even less mature are countermeasures that resist the combined application of both attack vectors. An interesting proposal in this context is CAPA, an algorithm-level countermeasure methodology that provides security against combined physical attacks in a very strong adversarial model. This thesis aims to contribute to the development and evaluation of combined countermeasures by applying the CAPA methodology to protect Keccak against combined physical attacks. Most influential due to their standardization as SHA-3, the Keccak sponge functions play an important role in symmetric-key cryptography. By presenting four secure hardware designs of Keccak, we explore the far-reaching speed-area tradeoff. %that plays an essential role in the design space of any hardware masking countermeasure. Depending on the Keccak permutation width, our low-latency implementation is either faster than or competitive to the previous side-channel protected implementations in the literature. At the other end of the spectrum, very compact implementations are obtained that are up to fifty times smaller than their high-speed counterparts. Resulting from these efforts are, to the best of our knowledge, the first implementations of Keccak with resistance against combined side-channel and fault attacks. The security against these threats can be scaled to arbitrary order by parametrization of the design. To aid the system designer, we assess the performance and implementation overhead of the countermeasure as a function of the security parameters. In addition, we introduce a more resource-efficient implementation of the CAPA preprocessing stage that applies generally to all cryptographic algorithms. To verify the security of the designs, we subjugate a suitable and representative Keccak implementation to state-of-the-art side-channel evaluation tests on an FPGA platform. No leakage is detected given the statistical evidence of 80 million power traces.

Keywords


Dissertation
Side-channel evaluation and countermeasures for ForkSkinny software implementations

Loading...
Export citation

Choose an application

Bookmark

Abstract

Due to recent developments in embedded device technology, it became apparent that a new cryptographic protocols where required which are suited to small, constrained devices operating in large interconnected communication networks where the bulk of message payloads only encompass few bytes. The field of lightweight cryptography set out to design new primitives which better suit this class of devices compared to the more heavyweight current standards and in 2018, the U.S. based NIST agency issued the start of a new standardization process within this context. In the light of this competition, a new cryptographic scheme called ForkAE was presented which implements a new procedure called forking. This thesis evaluates software implementations of ForkSkinny - the underlying primitive of ForkAE - in the context of power analysis attacks, a class of side-channel analysis which uses measurements of instantaneous power consumption to extract sensitive information from a target device. To this end, specific power analysis attack are devised and applied to the basic version of the cipher in order to asses vulnerability to these type of attacks. The effect of the forking procedure is analysed and it is shown that this procedure can aid attackers in extracting information more easily. In order to protect against power analysis, the masking countermeasure is deployed after a thorough discussion of the different methods and algorithms that this class of countermeasures encompasses. Software implementations for different masking orders, which use masked look-up tables in order to evaluate the non-linear S-box of the ForkSkinny round function, are presented and analyzed on a 32-bit architecture ARM Cortex-M4 platform. Lastly, the first and second order masked software implementations are subjected to leakage asssesment tests to analyze the resistance they provide against power analysis. ARM Assembly optimizations, following a programming methodology which aims to further minimize the leakage of information through the power side-channel, are then presented and these improved implementations are also subjected to the leakage tests. These optimized functions are shown to further limit the leakage, albeit at a loss in terms of performance.

Keywords

Listing 1 - 2 of 2
Sort by