[Resource Topic] 2019/954: CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme

Welcome to the resource topic for 2019/954

Title:
CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme

Authors: Mohsen Jahanbani, Zeinolabedin Norouzi, Nasour Bagheri

Abstract:

Authenticated encryption schemes provide both confidentiality and integrity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, like all physical implementations of any cryptographic system. In this paper, for the first time, a three-steps CPA attack against COLM, one of the winners of CAESAR, is presented to indicate its vulnerability. For this purpose, in this research paper, this authenticated encryption scheme is implemented on the FPGA of the SAKURA-G board and, by measuring and collecting 1,800 power traces, a successful CPA attack with zero value power model has been mounted on it. In addition, a protected hardware architecture for the COLM is proposed to make this design secure against first-order CPA attacks. To this end, a domain-oriented masking (DOM) scheme with two inputs/outputs share is used to protect the COLM. To verify the security of these countermeasures, we mounted a first and second-order CPA attack and a non-specified t-test on the protected COLM.

ePrint: https://eprint.iacr.org/2019/954

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .