Filters








6 Hits in 4.9 sec

Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher

Davide Bellizia, Francesco Berti, Olivier Bronchain, Gaëtan Cassiers, Sébastien Duval, Chun Guo, Gregor Leander, Gaëtan Leurent, Itamar Levi, Charles Momin, Olivier Pereira, Thomas Peters (+3 others)
2020 IACR Transactions on Symmetric Cryptology  
based on a Tweakable Block Cipher (TBC) providing strong data integrity guarantees in the presence of leakages.  ...  This paper defines Spook: a sponge-based authenticated encryption with associated data algorithm. It is primarily designed to provide security against side-channel attacks at a low energy cost.  ...  The authors are grateful to Patrick Derbez, Paul Huynh, Virginie Lallemand, Léo Perrin, Maria Naya Plasencia and Andre Schrottenloher for sharing their analysis of Shadow and Spook and discussing tweaks  ... 
doi:10.13154/tosc.v2020.is1.295-349 dblp:journals/tosc/BelliziaBBCDGLL20 fatcat:pavk7eg6ibakxcgncnlsh45g3m

Unprotected and Masked Hardware Implementations of Spook v2 [article]

Charles Momin, Gaëtan Cassiers, François-Xavier Standaert
2022 IACR Cryptology ePrint Archive  
We describe FPGA implementations of the Spook candidate to the NIST lightweight cryptography competition in two flavors.  ...  Second, protected implementations leveraging the leveled implementation concept that the Spook design enables and confirming the significant performance gains that it enables.  ...  Acknowledgements Gaetan Cassiers is a PhD student and François-Xavier Standaert is a Senior Research Associate of the Belgian Fund for Scientific Research (FNRS-F.R.S.).  ... 
dblp:journals/iacr/MominCS22a fatcat:h5pvtcstl5d6pa4hpokrj3s52u

Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle [article]

Davide Bellizia, Olivier Bronchain, Gaëtan Cassiers, Vincent Grosso, Chun Guo, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2020 IACR Cryptology ePrint Archive  
We finally initiate a comparative discussion of the different solutions to instantiate the components of a leakage-resistant authenticated encryption scheme.  ...  We illustrate the first point by analyzing several modes of operation with gradually increased leakage-resistance.  ...  As a case study, we encrypted a message composed of one block of authentication data and six blocks of plaintext.  ... 
dblp:journals/iacr/BelliziaBCGGMPP20 fatcat:lzjczutcmvhtbidq6n2o6cszui

Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces

Mohamud Ahmed Jimale, Muhammad Reza Z'aba, Miss Laiha Binti Mat Kiah, Mohd Yamani Idna Idris, Norziana Jamil, Moesfa Soeheila Mohamad, Mohd Saufy Rohmad
2022 IEEE Access  
Since its birth in 2000, authenticated encryption (AE) has been a hot research topic, and many new features have been proposed to boost its security or performance.  ...  The Block cipher was the dominant primitive in constructing AE schemes, followed by stream ciphers and compression functions until the sponge construction emerged in 2011.  ...  On the other side, the authors of Spook [82] used a leveled implementation where the key generation part is based on a tweakable block cipher.  ... 
doi:10.1109/access.2022.3171853 fatcat:dqvjxuh5snhypbbx6i2wtbfvb4

Leakage Resilient Value Comparison With Application to Message Authentication [article]

Christoph Dobraunig, Bart Mennink
2021 IACR Cryptology ePrint Archive  
permutation, or a (tweakable) block cipher, is already available.  ...  Comparisons sensitive to side-channel leakage occur in tag comparisons during the verification of message authentication codes (MACs) or authenticated encryption, but are typically omitted in security  ...  a tweakable block cipher instantiated with a secret key like SKINNY K [2] .  ... 
dblp:journals/iacr/DobraunigM21 fatcat:y5pujhkrxfbbffvq66tpxdzwem

TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications

Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2019 Transactions on Cryptographic Hardware and Embedded Systems  
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode leveraging Tweakable Block Ciphers (TBCs).  ...  (iii) It can be implemented with a remarkably low energy cost when strong resistance to side-channel attacks is needed, supports online encryption and handles static and incremental associated data efficiently  ...  E denotes a classical block cipher: EDT is a block cipher-based AEAD mode.  ... 
doi:10.13154/tches.v2020.i1.256-320 dblp:journals/tches/BertiGPPS20 fatcat:kqbuclxmdjdcxn4ai4ihgsa7ce