Introduction Problem: side-channel attacks Countermeasures: hiding, - - PowerPoint PPT Presentation

introduction
SMART_READER_LITE
LIVE PREVIEW

Introduction Problem: side-channel attacks Countermeasures: hiding, - - PowerPoint PPT Presentation

I SAP Towards Side-channel Secure AE Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer ESC 2017 www.iaik.tugraz.at Introduction Problem: side-channel attacks Countermeasures: hiding, masking, TI . .


slide-1
SLIDE 1

ISAP

Towards Side-channel Secure AE

Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer ESC 2017

slide-2
SLIDE 2

www.iaik.tugraz.at

Introduction

Problem: side-channel attacks Countermeasures: hiding, masking, TI . . .

1 / 21

slide-3
SLIDE 3

www.iaik.tugraz.at

Introduction

Problem: side-channel attacks Countermeasures: hiding, masking, TI . . . Reduce overhead of countermeasures ASCON, KETJE/KEYAK, PRIMATES, SCREAM, . . .

1 / 21

slide-4
SLIDE 4

www.iaik.tugraz.at

Introduction

Problem: side-channel attacks Countermeasures: hiding, masking, TI . . . Reduce overhead of countermeasures ASCON, KETJE/KEYAK, PRIMATES, SCREAM, . . . Can we do more? LR and MR AE [Ber+16] ISAP

1 / 21

slide-5
SLIDE 5

www.iaik.tugraz.at

ISAP

Authenticated encryption scheme Following requirements of CAESAR call No assumptions on choice of the nonce Provides protection against DPA for: Encryption Decryption Solely based on sponges Limits the attack surface against SPA

2 / 21

slide-6
SLIDE 6

www.iaik.tugraz.at

SPA and DPA

Simple Power Analysis (SPA) Observe device processing the same or a few inputs Techniques directly interpreting measurements Differential Power Analysis (DPA) Observe device processing many different inputs Allows for the use of statistical techniques

3 / 21

slide-7
SLIDE 7

www.iaik.tugraz.at

Is DPA Still a Threat?

  • A. Moradi and T. Schneider Improved Side-Channel

Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series COSADE 2016

  • E. Ronen, C. O’Flynn, A. Shamir, and A.-O. Weingarten

IoT Goes Nuclear: Creating a ZigBee Chain Reaction Cryptology ePrint Archive, Report 2016/1047, 2016

4 / 21

slide-8
SLIDE 8

www.iaik.tugraz.at

What to do Against DPA?

Implementation Hiding Masking Threshold implementations Scheme Fresh re-keying Leakage resilient cryptography

5 / 21

slide-9
SLIDE 9

www.iaik.tugraz.at

Fresh Re-keying [Med+10]

g E N K P K∗ Tag E−1 Reader P C g K K∗

6 / 21

slide-10
SLIDE 10

www.iaik.tugraz.at

Fresh Re-keying [Med+11]

E Na P Party 1 E−1 Party 2 P C Nb g K K∗ g K K∗

7 / 21

slide-11
SLIDE 11

www.iaik.tugraz.at

What About Storage?

E P Device Storage C g K K∗ N

Encryption still fine Decryption causes problems

8 / 21

slide-12
SLIDE 12

www.iaik.tugraz.at

How to Protect Decryption?

Solely rely on implementation countermeasures Costly Makes re-keying for encryption kind of obsolete Limit to one decryption Keep track of the nonce Re-encrypt data Time consuming Damaging

9 / 21

slide-13
SLIDE 13

www.iaik.tugraz.at

Multiple Decryption

Retain principles of fresh re-keying allowing multiple decryption

10 / 21

slide-14
SLIDE 14

www.iaik.tugraz.at

Multiple Decryption

Retain principles of fresh re-keying allowing multiple decryption DPA protection in storage settings

  • A. Moradi and T. Schneider Improved Side-Channel

Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series COSADE 2016 DPA protection in unidirectional/broadcast settings

  • E. Ronen, C. O’Flynn, A. Shamir, and A.-O. Weingarten

IoT Goes Nuclear: Creating a ZigBee Chain Reaction Cryptology ePrint Archive, Report 2016/1047, 2016

10 / 21

slide-15
SLIDE 15

www.iaik.tugraz.at

Priciple of ISAP’s Decryption

“Bind” the session key to the data that is decrypted

11 / 21

slide-16
SLIDE 16

www.iaik.tugraz.at

Priciple of ISAP’s Decryption

“Bind” the session key to the data that is decrypted

g NC H MAC T g C N Dec P K K

11 / 21

slide-17
SLIDE 17

www.iaik.tugraz.at

Priciple of ISAP’s Decryption

“Bind” the session key to the data that is decrypted

g NC H MAC T g C N Dec P K K

11 / 21

slide-18
SLIDE 18

www.iaik.tugraz.at

ISAP’s Authentication/Verification

C1 p Ct p p y p K∗

A

T N IV IV C1 p Ct p p N IV IV KA g

12 / 21

slide-19
SLIDE 19

www.iaik.tugraz.at

ISAP’s Authentication/Verification

C1 p Ct p p y p K∗

A

T N IV IV KA g

12 / 21

slide-20
SLIDE 20

www.iaik.tugraz.at

ISAP’s Authentication/Verification

NIV1 C1 pa

r1

Ct pa pa

c1

y KA pa g

r1 c1

K∗

A

k k

T

k

Use suffix MAC instead of hash-then-MAC

12 / 21

slide-21
SLIDE 21

www.iaik.tugraz.at

Possible g to Absorb Key

Modular multiplication [Med+10] LPL and LWE [Dzi+16] Sponges [TS14]

pa y KA pa g K∗

A

13 / 21

slide-22
SLIDE 22

www.iaik.tugraz.at

Absorbing the Key

Idea: Reduce rate to a minimum [TS14] Related to the classical GGM construction [GGM86]

r2

yw pb pc KAIV2

c2 r2

y1 pc

c2

K∗

A

k

pb

r2

y2

c2

14 / 21

slide-23
SLIDE 23

www.iaik.tugraz.at

ISAP’s En-/Decryption

r2

Nu

c3

pb pc pc pc KEIV3

c2 r3 r2

N1 pc

c2

P1 C1 Pv Cv

r3

15 / 21

slide-24
SLIDE 24

www.iaik.tugraz.at

Benefits of Sponges

Well-studied and analyzed Allows to implement a wide range of primitives No inverse building blocks (permutation) needed No key schedule, key is injected once

16 / 21

slide-25
SLIDE 25

www.iaik.tugraz.at

Sponges and Side-channel Leakage

p p c r r ℓi ℓi+1

17 / 21

slide-26
SLIDE 26

www.iaik.tugraz.at

Sponges and Side-channel Leakage

p p c r r ℓi ℓi+1 p p c′ r r ℓi + ℓi+1

c′ = c − (ℓi + ℓi+1)

17 / 21

slide-27
SLIDE 27

www.iaik.tugraz.at

Instances

KECCAK-p[400,nr] as permutation [Ber+14] Name Security level Bit size of Rounds k r1 r2 r3 a b c ISAP-128 128 144 1 144 20 12 12 TRUMPF-128 128 144 1 144 16 1 8

18 / 21

slide-28
SLIDE 28

www.iaik.tugraz.at

Implementation

One round per cycle Function Area Initialization Runtime per Block [kGE] [cycles] [µs] [cycles] [µs] ISAP-128 14.0 3 401 20.1 36 0.20 TRUMPF-128 14.0 564 3.3 28 0.16

19 / 21

slide-29
SLIDE 29

www.iaik.tugraz.at

Conclusion

AE scheme following requirements of CAESAR call Provides protection against DPA

Encryption Decryption

Enables several use-cases

Multiple decryption of stored data Unidirectional/Broadcast communication

20 / 21

slide-30
SLIDE 30

www.iaik.tugraz.at

Thank you

http://eprint.iacr.org/2016/952

21 / 21

slide-31
SLIDE 31

www.iaik.tugraz.at

References I

[Ber+14]

  • G. Bertoni, J. Daemen, M. Peeters, G. Van Assche, and
  • R. Van Keer

Ketje Submission to the CAESAR competition: http://competitions.cr.yp.to, 2014 [Ber+16]

  • F. Berti, F. Koeune, O. Pereira, T. Peters, and F.-X. Standaert

Leakage-Resilient and Misuse-Resistant Authenticated Encryption Cryptology ePrint Archive, Report 2016/996, 2016 [Dzi+16]

  • S. Dziembowski, S. Faust, G. Herold, A. Journault, D. Masny,

and F. Standaert Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems CRYPTO 2016

slide-32
SLIDE 32

www.iaik.tugraz.at

References II

[GGM86]

  • O. Goldreich, S. Goldwasser, and S. Micali

How to construct random functions

  • J. ACM 33:4, 1986

[Med+10]

  • M. Medwed, F.-X. Standaert, J. Großsch¨

adl, and F. Regazzoni Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices AFRICACRYPT 2010 [Med+11]

  • M. Medwed, C. Petit, F. Regazzoni, M. Renauld, and

F.-X. Standaert Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks CARDIS 2011 [MS16]

  • A. Moradi and T. Schneider

Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series COSADE 2016

slide-33
SLIDE 33

www.iaik.tugraz.at

References III

[Ron+16]

  • E. Ronen, C. O’Flynn, A. Shamir, and A.-O. Weingarten

IoT Goes Nuclear: Creating a ZigBee Chain Reaction Cryptology ePrint Archive, Report 2016/1047, 2016 [TS14]

  • M. M. I. Taha and P

. Schaumont Side-channel countermeasure for SHA-3 at almost-zero area

  • verhead

HOST 2014