SCA-Resistant GCM Implementation on 8-Bit AVR Microcontrollers

被引:7
|
作者
Seo, Seog Chung [1 ]
Kim, Heeseok [2 ]
机构
[1] Kookmin Univ, Dept Informat Secur Cryptol & Math, Seoul 02707, South Korea
[2] Korea Univ, Dept Cyber Secur, Sejong 30019, South Korea
来源
IEEE ACCESS | 2019年 / 7卷
基金
新加坡国家研究基金会;
关键词
Secure binary field multiplication; Galois/counter mode (GCM) mode; masking; side channel analysis (SCA); authenticated encryption (AE); simple power analysis (SPA); timing analysis (TA); differential power analysis (DPA); correlation power analysis (CPA); EFFICIENT IMPLEMENTATION; CRYPTOGRAPHY;
D O I
10.1109/ACCESS.2019.2930986
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Galois/counter mode (GCM) is one of the most widely used authenticated encryptions. To date, even though some works have investigated the security against side channel analysis (SCA) in the process of GCM computation, especially GHASH function, they failed to present comprehensive SCA security in consideration of both SPA/TA and DPA/CPA aspects simultaneously. In this paper, we present a secure GCM implementation on 8-bit AVR microcontroller environments. The proposed implementation provides comprehensive SCA security in consideration of not only SPA/TA but also DPA/CPA. In order to defeat SPA/TA, we introduce the concepts of dummy XOR with garbage registers and instruction level atomicity (ILA) and also present secure binary field (BF) multiplication method using them, which runs in a constant-time and fixed pattern. We also propose an efficient multiplicative masking method which can prevent DPA/CPA when computing GHASH function in the GCM process. Through actual implementation of the proposed method on an 8-bit AVR ATmega128 microcontroller, we show that the proposed method outperforms existing alternatives while providing comprehensive SCA security. With respect to the performance of secure binary field multiplication, the proposed multiplication method outperforms the related work by around 51.86% when computing a 128-bit binary field multiplication. Regarding the overhead of the multiplicative masking method, the proposed method requires only one additional BF multiplication and negligible amount of field additions regardless of the number of input blocks, while the related work consumes around the {log(m + n + 1) + 2} number of additional BF multiplications when there are (m + n + 1) input blocks. Through SCA-related experiments, we prove the SCA security of the proposed methods.
引用
收藏
页码:103961 / 103978
页数:18
相关论文
共 50 条
  • [41] Efficient implementation of modular multiplication over 192-bit NIST prime for 8-bit AVR-based sensor node
    Dong-won Park
    Seokhie Hong
    Nam Su Chang
    Sung Min Cho
    The Journal of Supercomputing, 2021, 77 : 4852 - 4870
  • [42] Compact LEA and HIGHT Implementations on 8-Bit AVR and 16-Bit MSP Processors
    Seo, Hwajeong
    An, Kyuhwang
    Kwon, Hyeokdong
    INFORMATION SECURITY APPLICATIONS, WISA 2018, 2019, 11402 : 253 - 265
  • [43] Efficient implementation of modular multiplication over 192-bit NIST prime for 8-bit AVR-based sensor node
    Park, Dong-won
    Hong, Seokhie
    Chang, Nam Su
    Cho, Sung Min
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (05): : 4852 - 4870
  • [44] High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
    Duell, Michael
    Haase, Bjoern
    Hinterwaelder, Gesine
    Hutter, Michael
    Paar, Christof
    Sanchez, Ana Helena
    Schwabe, Peter
    DESIGNS CODES AND CRYPTOGRAPHY, 2015, 77 (2-3) : 493 - 514
  • [45] Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR Processors
    Liu, Zhe
    Seo, Hwajeong
    Grosschaedl, Johann
    Kim, Howon
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 158 - 175
  • [46] High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
    Michael Düll
    Björn Haase
    Gesine Hinterwälder
    Michael Hutter
    Christof Paar
    Ana Helena Sánchez
    Peter Schwabe
    Designs, Codes and Cryptography, 2015, 77 : 493 - 514
  • [47] Challenges of testing high-volume, low-cost 8-bit microcontrollers
    Stout, M
    Tumin, K
    Vargas, C
    Gotchall, B
    41ST ANNUAL PROCEEDINGS: INTERNATIONAL RELIABILITY PHYSICS SYMPOSIUM, 2003, : 366 - 371
  • [48] Development of an 8-Bit AVR Microcontroller-based Network Measurement Probe
    Cajanding, John Paul F.
    Sesdoyro, Miguel Luis R.
    Uy, Agatha C.
    Tan, Wilson M.
    2019 7TH INTERNATIONAL CONFERENCE ON SMART COMPUTING & COMMUNICATIONS (ICSCC), 2019, : 304 - 309
  • [49] Implementation of an 8-bit embedded microprocessor for smart cards
    Mao, JL
    Shan, Y
    Yang, XZ
    2001 4TH INTERNATIONAL CONFERENCE ON ASIC PROCEEDINGS, 2001, : 752 - 755
  • [50] IMPLEMENTATION OF THE BOUNDED BUFFER ALGORITHM ON 8-BIT MICROCOMPUTERS
    FAY, DQM
    MICROPROCESSING AND MICROPROGRAMMING, 1985, 15 (01): : 21 - 33