Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency

This work introduces second-order masked implementation of LED, Midori, Skinny, and Prince ciphers which do not require fresh masks to be updated at every clock cycle. The main idea lies on a combination of the constructions given by Shahmirzadi and Moradi at CHES 2021, and the theory presented by...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Tim Beyne, Siemen Dhooghe, Amir Moradi, Aein Rezaei Shahmirzadi
Formato: article
Lenguaje:EN
Publicado: Ruhr-Universität Bochum 2021
Materias:
Acceso en línea:https://doaj.org/article/3bb2fde083c94208b0257cc864809569
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:3bb2fde083c94208b0257cc864809569
record_format dspace
spelling oai:doaj.org-article:3bb2fde083c94208b0257cc8648095692021-11-19T14:36:04ZCryptanalysis of Efficient Masked Ciphers: Applications to Low Latency10.46586/tches.v2022.i1.679-7212569-2925https://doaj.org/article/3bb2fde083c94208b0257cc8648095692021-11-01T00:00:00Zhttps://tches.iacr.org/index.php/TCHES/article/view/9312https://doaj.org/toc/2569-2925 This work introduces second-order masked implementation of LED, Midori, Skinny, and Prince ciphers which do not require fresh masks to be updated at every clock cycle. The main idea lies on a combination of the constructions given by Shahmirzadi and Moradi at CHES 2021, and the theory presented by Beyne et al. at Asiacrypt 2020. The presented masked designs only use a minimal number of shares, i.e., three to achieve second-order security, and we make use of a trick to pair a couple of S-boxes to reduce their latency. The theoretical security analyses of our constructions are based on the linear-cryptanalytic properties of the underlying masked primitive as well as SILVER, the leakage verification tool presented at Asiacrypt 2020. To improve this cryptanalytic analysis, we use the noisy probing model which allows for the inclusion of noise in the framework of Beyne et al. We further provide FPGA-based experimental security analysis confirming second-order protection of our masked implementations. Tim BeyneSiemen DhoogheAmir MoradiAein Rezaei ShahmirzadiRuhr-Universität BochumarticleHardwareLinear CryptanalysisMaskingProbing SecuritySide- Channel AnalysisThreshold ImplementationsComputer engineering. Computer hardwareTK7885-7895Information technologyT58.5-58.64ENTransactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 1 (2021)
institution DOAJ
collection DOAJ
language EN
topic Hardware
Linear Cryptanalysis
Masking
Probing Security
Side- Channel Analysis
Threshold Implementations
Computer engineering. Computer hardware
TK7885-7895
Information technology
T58.5-58.64
spellingShingle Hardware
Linear Cryptanalysis
Masking
Probing Security
Side- Channel Analysis
Threshold Implementations
Computer engineering. Computer hardware
TK7885-7895
Information technology
T58.5-58.64
Tim Beyne
Siemen Dhooghe
Amir Moradi
Aein Rezaei Shahmirzadi
Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency
description This work introduces second-order masked implementation of LED, Midori, Skinny, and Prince ciphers which do not require fresh masks to be updated at every clock cycle. The main idea lies on a combination of the constructions given by Shahmirzadi and Moradi at CHES 2021, and the theory presented by Beyne et al. at Asiacrypt 2020. The presented masked designs only use a minimal number of shares, i.e., three to achieve second-order security, and we make use of a trick to pair a couple of S-boxes to reduce their latency. The theoretical security analyses of our constructions are based on the linear-cryptanalytic properties of the underlying masked primitive as well as SILVER, the leakage verification tool presented at Asiacrypt 2020. To improve this cryptanalytic analysis, we use the noisy probing model which allows for the inclusion of noise in the framework of Beyne et al. We further provide FPGA-based experimental security analysis confirming second-order protection of our masked implementations.
format article
author Tim Beyne
Siemen Dhooghe
Amir Moradi
Aein Rezaei Shahmirzadi
author_facet Tim Beyne
Siemen Dhooghe
Amir Moradi
Aein Rezaei Shahmirzadi
author_sort Tim Beyne
title Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency
title_short Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency
title_full Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency
title_fullStr Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency
title_full_unstemmed Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency
title_sort cryptanalysis of efficient masked ciphers: applications to low latency
publisher Ruhr-Universität Bochum
publishDate 2021
url https://doaj.org/article/3bb2fde083c94208b0257cc864809569
work_keys_str_mv AT timbeyne cryptanalysisofefficientmaskedciphersapplicationstolowlatency
AT siemendhooghe cryptanalysisofefficientmaskedciphersapplicationstolowlatency
AT amirmoradi cryptanalysisofefficientmaskedciphersapplicationstolowlatency
AT aeinrezaeishahmirzadi cryptanalysisofefficientmaskedciphersapplicationstolowlatency
_version_ 1718420064642793472