SCA-Resistant GCM Implementation on 8-Bit AVR Microcontrollers

被引:7
|
作者
Seo, Seog Chung [1 ]
Kim, Heeseok [2 ]
机构
[1] Kookmin Univ, Dept Informat Secur Cryptol & Math, Seoul 02707, South Korea
[2] Korea Univ, Dept Cyber Secur, Sejong 30019, South Korea
来源
IEEE ACCESS | 2019年 / 7卷
基金
新加坡国家研究基金会;
关键词
Secure binary field multiplication; Galois/counter mode (GCM) mode; masking; side channel analysis (SCA); authenticated encryption (AE); simple power analysis (SPA); timing analysis (TA); differential power analysis (DPA); correlation power analysis (CPA); EFFICIENT IMPLEMENTATION; CRYPTOGRAPHY;
D O I
10.1109/ACCESS.2019.2930986
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Galois/counter mode (GCM) is one of the most widely used authenticated encryptions. To date, even though some works have investigated the security against side channel analysis (SCA) in the process of GCM computation, especially GHASH function, they failed to present comprehensive SCA security in consideration of both SPA/TA and DPA/CPA aspects simultaneously. In this paper, we present a secure GCM implementation on 8-bit AVR microcontroller environments. The proposed implementation provides comprehensive SCA security in consideration of not only SPA/TA but also DPA/CPA. In order to defeat SPA/TA, we introduce the concepts of dummy XOR with garbage registers and instruction level atomicity (ILA) and also present secure binary field (BF) multiplication method using them, which runs in a constant-time and fixed pattern. We also propose an efficient multiplicative masking method which can prevent DPA/CPA when computing GHASH function in the GCM process. Through actual implementation of the proposed method on an 8-bit AVR ATmega128 microcontroller, we show that the proposed method outperforms existing alternatives while providing comprehensive SCA security. With respect to the performance of secure binary field multiplication, the proposed multiplication method outperforms the related work by around 51.86% when computing a 128-bit binary field multiplication. Regarding the overhead of the multiplicative masking method, the proposed method requires only one additional BF multiplication and negligible amount of field additions regardless of the number of input blocks, while the related work consumes around the {log(m + n + 1) + 2} number of additional BF multiplications when there are (m + n + 1) input blocks. Through SCA-related experiments, we prove the SCA security of the proposed methods.
引用
收藏
页码:103961 / 103978
页数:18
相关论文
共 50 条
  • [21] 8-BIT MICROCONTROLLERS SPECIALIZE FOR EMBEDDED CONTROL APPLICATIONS
    BOND, J
    COMPUTER DESIGN, 1987, 26 (21): : 26 - &
  • [22] Implementation of high-resolution time-to-digital converter in 8-bit microcontrollers
    Bengtsson, Lars E.
    REVIEW OF SCIENTIFIC INSTRUMENTS, 2012, 83 (04):
  • [23] Implementation of simple MPPT algorithms using low-cost 8-bit microcontrollers
    Oprea, Sergiu
    Rosu-Hamzescu, Mihnea
    Radoi, Constantin
    PROCEEDINGS OF THE 2014 6TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI), 2014,
  • [24] TI MAKES ANOTHER STAB AT 8-BIT MICROCONTROLLERS
    NAEGELE, T
    ELECTRONICS-US, 1988, 61 (09): : 32 - +
  • [25] Time and power performance study on 8-bit microcontrollers
    Vladescu, Alexandru
    Constantinescu, Rodica
    Stoichescu, Dan
    ADVANCED TOPICS IN OPTOELECTRONICS, MICROELECTRONICS AND NANOTECHNOLOGIES X, 2020, 11718
  • [26] Optimized Karatsuba squaring on 8-bit AVR processors
    Seo, Hwajeong
    Liu, Zhe
    Choi, Jongseok
    Kim, Howon
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3546 - 3554
  • [27] 8-BIT MICROCONTROLLERS SPECIALIZE FOR EMBEDDED CONTROL APPLICATIONS.
    Bond, John
    Electronic Systems Technology and Design/Computer Design's, 1987, 26 (21): : 28 - 32
  • [28] Realization of fast Fourier's transform by 8-bit microcontrollers
    Fisich, V. P.
    Korchovyy, O., V
    Movchanyuk, A., V
    VISNYK NTUU KPI SERIIA-RADIOTEKHNIKA RADIOAPARATOBUDUVANNIA, 2008, (37): : 50 - 52
  • [29] C-COMPILERS EASE DEVELOPMENT FOR 8-BIT MICROCONTROLLERS
    WILLIAMS, T
    COMPUTER DESIGN, 1989, 28 (21): : 48 - 50
  • [30] Ring-LWE on 8-Bit AVR Embedded Processor
    Seo, Hwajeong
    Kwon, Hyeokdong
    Kwon, Yongbeen
    Kim, Kyungho
    Choi, Seungju
    Kim, Hyunjun
    Jang, Kyoungbae
    INFORMATION SECURITY APPLICATIONS, WISA 2019, 2020, 11897 : 315 - 327