Back to Search Start Over

Low-Latency Masked Gadgets Robust against Physical Defaults with Application to Ascon

Authors :
Gaëtan Cassiers
François-Xavier Standaert
Corentin Verhamme
Source :
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)
Publication Year :
2024
Publisher :
Ruhr-Universität Bochum, 2024.

Abstract

Low-latency masked hardware implementations are known to be a difficult challenge. On the one hand, the propagation of glitches can falsify their independence assumption (that is required for security) and can only be stopped by registers. This implies that glitch-robust masked AND gates (maintaining a constant number of shares) require at least one cycle. On the other hand, Knichel and Moradi’s only known single-cycle multiplication gadget that ensures (composable) security against glitches for any number of shares requires additional care to maintain security against transition-based leakages. For example, it cannot be integrated in a single-cycle roundbased architecture which is a natural choice for low-latency implementations. In this paper, we therefore describe the first single-cycle masked multiplication gadget that is trivially composable and provides security against transitions and glitches, and prove its security in the robust probing model. We then analyze the interest of this new gadget for the secure implementation of the future lightweight cryptography standard Ascon, which has good potential for low-latency. We show that it directly leads to improvements for uniformly protected implementations (where all computations are masked). We also show that it is can be handy for integration in so-called leveled implementations (where only the key derivation and the tag generation are masked, which provides integrity with leakage in encryption and decryption and confidentiality with leakage in encryption only). Most importantly, we show that it is very attractive for implementations that we denote as multi-target, which can alternate between uniformly protected and leveled implementations, without latency overheads and at limited cost. We complete these findings by evaluating different protected implementations of Ascon, clarifying its hardware design space.

Details

Language :
English
ISSN :
25692925
Volume :
2024
Issue :
3
Database :
Directory of Open Access Journals
Journal :
Transactions on Cryptographic Hardware and Embedded Systems
Publication Type :
Academic Journal
Accession number :
edsdoj.2dfdd6f9e17943a3bce1200ee945a53b
Document Type :
article
Full Text :
https://doi.org/10.46586/tches.v2024.i3.603-633