Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher

被引:19
|
作者
Bellizia, Davide [1 ]
Berti, Francesco [1 ]
Bronchain, Olivier [1 ]
Cassiers, Gaetan [1 ]
Duval, Sebastien [1 ]
Guo, Chun [2 ,3 ]
Leander, Gregor [4 ]
Leurent, Gaetan [5 ]
Levi, Itamar [1 ]
Momin, Charles [1 ]
Pereira, Olivier [1 ]
Peters, Thomas [1 ]
Standaert, Francois-Xavier [1 ]
Udvarhelyi, Balazs [1 ]
Wiemer, Friedrich [4 ]
机构
[1] Catholic Univ Louvain, ICTEAM Inst, Louvain La Neuve, Belgium
[2] Shandong Univ, Sch Cyber Sci & Technol, Jinan, Peoples R China
[3] Shandong Univ, Key Lab Cryptol Technol & Informat Secur, Minist Educ, Jinan, Peoples R China
[4] Ruhr Univ Bochum, Bochum, Germany
[5] Inria Paris Res Ctr, Team SECRET, Paris, France
基金
欧盟地平线“2020”;
关键词
Authenticated encryption; NIST lightweight cryptography standardization effort; leakage-resistance; bitslice ciphers; masking countermeasure; low energy; SIDE-CHANNEL; CRYPTANALYSIS; SECURITY; ATTACKS;
D O I
10.13154/tosc.v2020.iS1.295-349
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper defines Spook: a sponge-based authenticated encryption with associated data algorithm. It is primarily designed to provide security against side-channel attacks at a low energy cost. For this purpose, Spook is mixing a leakage-resistant mode of operation with bitslice ciphers enabling efficient and low latency implementations. The leakage-resistant mode of operation leverages a re-keying function to prevent differential side-channel analysis, a duplex sponge construction to efficiently process the data, and a tag verification based on a Tweakable Block Cipher (TBC) providing strong data integrity guarantees in the presence of leakages. The underlying bitslice ciphers are optimized for the masking countermeasures against side-channel attacks. Spook is an efficient single-pass algorithm. It ensures state-ofthe-art black box security with several prominent features: (i) nonce misuse-resilience, (ii) beyond-birthday security with respect to the TBC block size, and (iii) multiuser security at minimum cost with a public tweak. Besides the specifications and design rationale, we provide first software and hardware implementation results of (unprotected) Spook which confirm the limited overheads that the use of two primitives sharing internal components imply. We also show that the integrity of Spook with leakage, so far analyzed with unbounded leakages for the duplex sponge and a strongly protected TBC modeled as leak-free, can be proven with a much weaker unpredictability assumption for the TBC. We finally discuss external cryptanalysis results and tweaks to improve both the security margins and efficiency of Spook.
引用
收藏
页码:295 / 349
页数:55
相关论文
共 12 条
  • [1] Compactly Committing Authenticated Encryption Using Tweakable Block Cipher
    Hirose, Shoichi
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2020, 2020, 12570 : 187 - 206
  • [2] Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher
    Hirose, Shoichi
    Minematsu, Kazuhiko
    [J]. SELECTED AREAS IN CRYPTOGRAPHY - SAC 2023, 2024, 14201 : 233 - 252
  • [3] Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction
    Guo, Chun
    Pereira, Olivier
    Peters, Thomas
    Standaert, Francois-Xavier
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (01) : 6 - 42
  • [4] Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation
    Goudarzi, Dahmun
    Jean, Jeremy
    Kolbl, Stefan
    Peyrin, Thomas
    Rivain, Matthieu
    Sasaki, Yu
    Sim, Siang Meng
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 : 31 - 59
  • [5] Sponge-Based Authenticated Encryption: Security Against Quantum Attackers
    Janson, Christian
    Struck, Patrick
    [J]. POST-QUANTUM CRYPTOGRAPHY (PQCRYPTO 2022), 2022, 13512 : 230 - 259
  • [6] Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes
    Philipp Jovanovic
    Atul Luykx
    Bart Mennink
    Yu Sasaki
    Kan Yasuda
    [J]. Journal of Cryptology, 2019, 32 : 895 - 940
  • [7] Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes
    Jovanovic, Philipp
    Luykx, Atul
    Mennink, Bart
    Sasaki, Yu
    Yasuda, Kan
    [J]. JOURNAL OF CRYPTOLOGY, 2019, 32 (03) : 895 - 940
  • [8] Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes
    Jovanovic, Philipp
    Luykx, Atul
    Mennink, Bart
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 85 - 104
  • [9] Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection
    Jimale, Mohamud Ahmed
    Abdullah, Nor Aniza
    Kiah, Miss Laiha Binti Mat
    Idris, Mohd Yamani Idna
    Z'Aba, Muhammad Reza
    Jamil, Norziana
    Rohmad, Mohd Saufy
    [J]. IEEE ACCESS, 2023, 11 : 59661 - 59674
  • [10] Customizable Sponge-Based Authenticated Encryption Using 16-bit S-boxes
    Kelly, Matthew
    Kaminsky, Alan
    Kurdziel, Michael
    Lukowiak, Marcin
    Radziszowski, Stanislaw
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 43 - 48