Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers

dc.contributor.authorDiehl, Williamen
dc.contributor.authorAbdulgadir, Abubakren
dc.contributor.authorFarahmand, Farnouden
dc.contributor.authorKaps, Jens-Peteren
dc.contributor.authorGaj, Krisen
dc.contributor.departmentElectrical and Computer Engineeringen
dc.date.accessioned2018-09-21T16:40:22Zen
dc.date.available2018-09-21T16:40:22Zen
dc.date.issued2018-09-19en
dc.date.updated2018-09-21T07:12:02Zen
dc.description.abstractAuthenticated ciphers, which combine the cryptographic services of confidentiality, integrity, and authentication into one algorithmic construct, can potentially provide improved security and efficiencies in the processing of sensitive data. However, they are vulnerable to side-channel attacks such as differential power analysis (DPA). Although the Test Vector Leakage Assessment (TVLA) methodology has been used to confirm improved resistance of block ciphers to DPA after application of countermeasures, extension of TVLA to authenticated ciphers is non-trivial, since authenticated ciphers have expanded input and output requirements, complex interfaces, and long test vectors which include protocol necessary to describe authenticated cipher operations. In this research, we upgrade the FOBOS test architecture with capability to perform TVLA on authenticated ciphers. We show that FPGA implementations of the CAESAR Round 3 candidates ACORN, Ascon, CLOC (with AES and TWINE primitives), SILC (with AES, PRESENT, and LED primitives), JAMBU (with AES and SIMON primitives), and Ketje Jr.; as well as AES-GCM, are vulnerable to 1st order DPA. We then use threshold implementations to protect the above cipher implementations against 1st order DPA, and verify the effectiveness of countermeasures using the TVLA methodology. Finally, we compare the unprotected and protected cipher implementations in terms of area, performance (maximum frequency and throughput), throughput-to-area (TP/A) ratio, power, and energy per bit (E/bit). Our results show that ACORN consumes the lowest number of resources, has the highest TP/A ratio, and is the most energy-efficient of all DPA-resistant implementations. However, Ketje Jr. has the highest throughput.en
dc.description.versionPublished versionen
dc.format.mimetypeapplication/pdfen
dc.identifier.citationDiehl, W.; Abdulgadir, A.; Farahmand, F.; Kaps, J.-P.; Gaj, K. Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers. Cryptography 2018, 2, 26.en
dc.identifier.doihttps://doi.org/10.3390/cryptography2030026en
dc.identifier.urihttp://hdl.handle.net/10919/85067en
dc.language.isoenen
dc.publisherMDPIen
dc.rightsCreative Commons Attribution 4.0 Internationalen
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/en
dc.subjectcryptographyen
dc.subjectauthenticated cipheren
dc.subjectfield programmable gate arrayen
dc.subjectpower analysisen
dc.subjectside channel attacken
dc.subjectcountermeasureen
dc.subjectlightweighten
dc.subjectTVLAen
dc.subjectt-testen
dc.titleComparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphersen
dc.title.serialCryptographyen
dc.typeArticle - Refereeden
dc.type.dcmitypeTexten

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
cryptography-02-00026.pdf
Size:
3.1 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
Name:
license.txt
Size:
1.5 KB
Format:
Item-specific license agreed upon to submission
Description: