Conference paper Open Access

ISAP -- Towards Side-Channel Secure Authenticated Encryption

Christoph Dobraunig; Maria Eichlseder; Stefan Mangard; Florian Mendel; Thomas Unterluggauer


JSON Export

{
  "files": [
    {
      "links": {
        "self": "https://zenodo.org/api/files/35ec7766-fdc9-4cac-9724-d3662ed5e41e/IACR-FSE-ISAP-Towards-SC-Secure-AE.pdf"
      }, 
      "checksum": "md5:62de521d618f34ffd2f843bb3d3be49a", 
      "bucket": "35ec7766-fdc9-4cac-9724-d3662ed5e41e", 
      "key": "IACR-FSE-ISAP-Towards-SC-Secure-AE.pdf", 
      "type": "pdf", 
      "size": 573980
    }
  ], 
  "owners": [
    22112
  ], 
  "doi": "10.5281/zenodo.571743", 
  "stats": {
    "version_unique_downloads": 7.0, 
    "unique_views": 15.0, 
    "views": 15.0, 
    "downloads": 7.0, 
    "unique_downloads": 7.0, 
    "version_unique_views": 14.0, 
    "volume": 4017860.0, 
    "version_downloads": 7.0, 
    "version_views": 14.0, 
    "version_volume": 4017860.0
  }, 
  "links": {
    "doi": "https://doi.org/10.5281/zenodo.571743", 
    "latest_html": "https://zenodo.org/record/571743", 
    "bucket": "https://zenodo.org/api/files/35ec7766-fdc9-4cac-9724-d3662ed5e41e", 
    "badge": "https://zenodo.org/badge/doi/10.5281/zenodo.571743.svg", 
    "html": "https://zenodo.org/record/571743", 
    "latest": "https://zenodo.org/api/records/571743"
  }, 
  "created": "2017-05-05T09:25:43.776688+00:00", 
  "updated": "2017-09-08T08:01:37.850864+00:00", 
  "conceptrecid": "800122", 
  "revision": 4, 
  "id": 571743, 
  "metadata": {
    "access_right_category": "success", 
    "doi": "10.5281/zenodo.571743", 
    "description": "<p>Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations. One approach to counteract such attacks are cryptographic schemes based on fresh re-keying. In settings of pre-shared secret keys, such schemes render DPA attacks infeasible by deriving session keys and by ensuring that the attacker cannot collect side-channel leakage on the session key during cryptographic operations with different inputs. While these schemes can be applied to secure standard communication settings, current re-keying approaches are unable to provide protection in settings where the same input needs to be processed multiple times. In this work, we therefore adapt the re-keying approach and present a symmetric authenticated encryption scheme that is secure against DPA attacks and that does not have such a usage restriction. This means that our scheme fully complies with the requirements given in the CAESAR call and hence, can be used like other noncebased authenticated encryption schemes without loss of side-channel protection. Its resistance against side-channel analysis is highly relevant for several applications in practice, like bulk storage settings in general and the protection of FPGA bitfiles and firmware images in particular.</p>", 
    "license": {
      "id": "CC-BY-NC-4.0"
    }, 
    "title": "ISAP -- Towards Side-Channel Secure Authenticated Encryption", 
    "relations": {
      "version": [
        {
          "count": 1, 
          "index": 0, 
          "parent": {
            "pid_type": "recid", 
            "pid_value": "800122"
          }, 
          "is_last": true, 
          "last_child": {
            "pid_type": "recid", 
            "pid_value": "571743"
          }
        }
      ]
    }, 
    "communities": [
      {
        "id": "hector"
      }
    ], 
    "grants": [
      {
        "code": "644052", 
        "links": {
          "self": "https://zenodo.org/api/grants/10.13039/501100000780::644052"
        }, 
        "title": "HARDWARE ENABLED CRYPTO AND RANDOMNESS", 
        "acronym": "HECTOR", 
        "program": "H2020", 
        "funder": {
          "doi": "10.13039/501100000780", 
          "acronyms": [
            "EC"
          ], 
          "name": "European Commission", 
          "links": {
            "self": "https://zenodo.org/api/funders/10.13039/501100000780"
          }
        }
      }
    ], 
    "keywords": [
      "authenticated encryption", 
      "fresh re-keying", 
      "passive side-channel attacks", 
      "sponge construction", 
      "permutation-based construction"
    ], 
    "publication_date": "2017-03-05", 
    "creators": [
      {
        "affiliation": "Graz University of Technology", 
        "name": "Christoph Dobraunig"
      }, 
      {
        "affiliation": "Graz University of Technology", 
        "name": "Maria Eichlseder"
      }, 
      {
        "affiliation": "Graz University of Technology", 
        "name": "Stefan Mangard"
      }, 
      {
        "affiliation": "Graz University of Technology", 
        "name": "Florian Mendel"
      }, 
      {
        "affiliation": "Graz University of Technology", 
        "name": "Thomas Unterluggauer"
      }
    ], 
    "meeting": {
      "acronym": "FSE 2017", 
      "url": "https://www.nuee.nagoya-u.ac.jp/labs/tiwata/fse2017/", 
      "dates": "5 - 8 March 2017", 
      "place": "Tokyo, Japan", 
      "title": "Fast Software Encryption 2017"
    }, 
    "access_right": "open", 
    "resource_type": {
      "subtype": "conferencepaper", 
      "type": "publication", 
      "title": "Conference paper"
    }
  }
}
14
7
views
downloads
All versions This version
Views 1415
Downloads 77
Data volume 4.0 MB4.0 MB
Unique views 1415
Unique downloads 77

Share

Cite as