Block Ciphers That Are Easier to Mask: How Far Can We Go? View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2013

AUTHORS

B. Gérard , Vincent Grosso , M. Naya-Plasencia , François-Xavier Standaert

ABSTRACT

The design and analysis of lightweight block ciphers has been a very active research area over the last couple of years, with many innovative proposals trying to optimize different performance figures. However, since these block ciphers are dedicated to low-cost embedded devices, their implementation is also a typical target for side-channel adversaries. As preventing such attacks with countermeasures usually implies significant performance overheads, a natural open problem is to propose new algorithms for which physical security is considered as an optimization criteria, hence allowing better performances again. We tackle this problem by studying how much we can tweak standard block ciphers such as the AES Rijndael in order to allow efficient masking (that is one of the most frequently considered solutions to improve security against side-channel attacks). For this purpose, we first investigate alternative S-boxes and round structures. We show that both approaches can be used separately in order to limit the total number of non-linear operations in the block cipher, hence allowing more efficient masking. We then combine these ideas into a concrete instance of block cipher called Zorro. We further provide a detailed security analysis of this new cipher taking its design specificities into account, leading us to exploit innovative techniques borrowed from hash function cryptanalysis (that are sometimes of independent interest). Eventually, we conclude the paper by evaluating the efficiency of masked Zorro implementations in an 8-bit microcontroller, and exhibit their interesting performance figures. More... »

PAGES

383-399

Book

TITLE

Cryptographic Hardware and Embedded Systems - CHES 2013

ISBN

978-3-642-40348-4
978-3-642-40349-1

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-40349-1_22

DOI

http://dx.doi.org/10.1007/978-3-642-40349-1_22

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1000742082


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Direction G\u00e9n\u00e9rale de l\u2019Armement, France", 
          "id": "http://www.grid.ac/institutes/grid.484080.0", 
          "name": [
            "ICTEAM/ELEN/Crypto Group, Universit\u00e9\u00a0Catholique\u00a0de\u00a0Louvain, Belgium", 
            "Direction G\u00e9n\u00e9rale de l\u2019Armement, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "G\u00e9rard", 
        "givenName": "B.", 
        "id": "sg:person.016057442455.35", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016057442455.35"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "ICTEAM/ELEN/Crypto Group, Universit\u00e9\u00a0Catholique\u00a0de\u00a0Louvain, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.7942.8", 
          "name": [
            "ICTEAM/ELEN/Crypto Group, Universit\u00e9\u00a0Catholique\u00a0de\u00a0Louvain, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Grosso", 
        "givenName": "Vincent", 
        "id": "sg:person.012111562345.12", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012111562345.12"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "INRIA Paris-Rocquencourt, France", 
          "id": "http://www.grid.ac/institutes/grid.5328.c", 
          "name": [
            "INRIA Paris-Rocquencourt, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Naya-Plasencia", 
        "givenName": "M.", 
        "id": "sg:person.013206304341.94", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "ICTEAM/ELEN/Crypto Group, Universit\u00e9\u00a0Catholique\u00a0de\u00a0Louvain, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.7942.8", 
          "name": [
            "ICTEAM/ELEN/Crypto Group, Universit\u00e9\u00a0Catholique\u00a0de\u00a0Louvain, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Standaert", 
        "givenName": "Fran\u00e7ois-Xavier", 
        "id": "sg:person.07523201203.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07523201203.18"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2013", 
    "datePublishedReg": "2013-01-01", 
    "description": "The design and analysis of lightweight block ciphers has been a very active research area over the last couple of years, with many innovative proposals trying to optimize different performance figures. However, since these block ciphers are dedicated to low-cost embedded devices, their implementation is also a typical target for side-channel adversaries. As preventing such attacks with countermeasures usually implies significant performance overheads, a natural open problem is to propose new algorithms for which physical security is considered as an optimization criteria, hence allowing better performances again. We tackle this problem by studying how much we can tweak standard block ciphers such as the AES Rijndael in order to allow efficient masking (that is one of the most frequently considered solutions to improve security against side-channel attacks). For this purpose, we first investigate alternative S-boxes and round structures. We show that both approaches can be used separately in order to limit the total number of non-linear operations in the block cipher, hence allowing more efficient masking. We then combine these ideas into a concrete instance of block cipher called Zorro. We further provide a detailed security analysis of this new cipher taking its design specificities into account, leading us to exploit innovative techniques borrowed from hash function cryptanalysis (that are sometimes of independent interest). Eventually, we conclude the paper by evaluating the efficiency of masked Zorro implementations in an 8-bit microcontroller, and exhibit their interesting performance figures.", 
    "editor": [
      {
        "familyName": "Bertoni", 
        "givenName": "Guido", 
        "type": "Person"
      }, 
      {
        "familyName": "Coron", 
        "givenName": "Jean-S\u00e9bastien", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-40349-1_22", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-40348-4", 
        "978-3-642-40349-1"
      ], 
      "name": "Cryptographic Hardware and Embedded Systems - CHES 2013", 
      "type": "Book"
    }, 
    "keywords": [
      "performance figures", 
      "non-linear operations", 
      "different performance figures", 
      "hash functions cryptanalysis", 
      "optimization criteria", 
      "better performance", 
      "innovative technique", 
      "typical targets", 
      "block cipher", 
      "microcontroller", 
      "active research area", 
      "design specificities", 
      "devices", 
      "detailed security analysis", 
      "significant performance overheads", 
      "efficient masking", 
      "operation", 
      "side-channel adversary", 
      "standard block cipher", 
      "efficiency", 
      "design", 
      "lightweight block ciphers", 
      "performance", 
      "order", 
      "security analysis", 
      "such attacks", 
      "performance overheads", 
      "new algorithm", 
      "new cipher", 
      "research area", 
      "implementation", 
      "physical security", 
      "problem", 
      "cipher", 
      "structure", 
      "technique", 
      "last couple", 
      "concrete instances", 
      "figures", 
      "AES Rijndael", 
      "S-boxes", 
      "innovative proposal", 
      "open problem", 
      "algorithm", 
      "analysis", 
      "countermeasures", 
      "masking", 
      "account", 
      "approach", 
      "area", 
      "natural open problems", 
      "overhead", 
      "adversary", 
      "cryptanalysis", 
      "Rijndael", 
      "security", 
      "attacks", 
      "round structures", 
      "purpose", 
      "couples", 
      "number", 
      "criteria", 
      "proposal", 
      "Zorro", 
      "instances", 
      "Far", 
      "idea", 
      "target", 
      "total number", 
      "years", 
      "specificity", 
      "paper"
    ], 
    "name": "Block Ciphers That Are Easier to Mask: How Far Can We Go?", 
    "pagination": "383-399", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1000742082"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-40349-1_22"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-40349-1_22", 
      "https://app.dimensions.ai/details/publication/pub.1000742082"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-10-01T06:57", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221001/entities/gbq_results/chapter/chapter_345.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-40349-1_22"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-40349-1_22'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-40349-1_22'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-40349-1_22'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-40349-1_22'


 

This table displays all metadata directly associated to this object as RDF triples.

164 TRIPLES      22 PREDICATES      97 URIs      90 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-40349-1_22 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N23533bba4b47432aaacd120fd11b6b2b
4 schema:datePublished 2013
5 schema:datePublishedReg 2013-01-01
6 schema:description The design and analysis of lightweight block ciphers has been a very active research area over the last couple of years, with many innovative proposals trying to optimize different performance figures. However, since these block ciphers are dedicated to low-cost embedded devices, their implementation is also a typical target for side-channel adversaries. As preventing such attacks with countermeasures usually implies significant performance overheads, a natural open problem is to propose new algorithms for which physical security is considered as an optimization criteria, hence allowing better performances again. We tackle this problem by studying how much we can tweak standard block ciphers such as the AES Rijndael in order to allow efficient masking (that is one of the most frequently considered solutions to improve security against side-channel attacks). For this purpose, we first investigate alternative S-boxes and round structures. We show that both approaches can be used separately in order to limit the total number of non-linear operations in the block cipher, hence allowing more efficient masking. We then combine these ideas into a concrete instance of block cipher called Zorro. We further provide a detailed security analysis of this new cipher taking its design specificities into account, leading us to exploit innovative techniques borrowed from hash function cryptanalysis (that are sometimes of independent interest). Eventually, we conclude the paper by evaluating the efficiency of masked Zorro implementations in an 8-bit microcontroller, and exhibit their interesting performance figures.
7 schema:editor N9dc5bfe35b204f4c8c54f3790eaf3822
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N2f0494d2556f43e9a661b2be36a88dfe
11 schema:keywords AES Rijndael
12 Far
13 Rijndael
14 S-boxes
15 Zorro
16 account
17 active research area
18 adversary
19 algorithm
20 analysis
21 approach
22 area
23 attacks
24 better performance
25 block cipher
26 cipher
27 concrete instances
28 countermeasures
29 couples
30 criteria
31 cryptanalysis
32 design
33 design specificities
34 detailed security analysis
35 devices
36 different performance figures
37 efficiency
38 efficient masking
39 figures
40 hash functions cryptanalysis
41 idea
42 implementation
43 innovative proposal
44 innovative technique
45 instances
46 last couple
47 lightweight block ciphers
48 masking
49 microcontroller
50 natural open problems
51 new algorithm
52 new cipher
53 non-linear operations
54 number
55 open problem
56 operation
57 optimization criteria
58 order
59 overhead
60 paper
61 performance
62 performance figures
63 performance overheads
64 physical security
65 problem
66 proposal
67 purpose
68 research area
69 round structures
70 security
71 security analysis
72 side-channel adversary
73 significant performance overheads
74 specificity
75 standard block cipher
76 structure
77 such attacks
78 target
79 technique
80 total number
81 typical targets
82 years
83 schema:name Block Ciphers That Are Easier to Mask: How Far Can We Go?
84 schema:pagination 383-399
85 schema:productId N83dfba4b377841fd866df076a82c5391
86 N9a8332d9738340c1ae502b71795594b8
87 schema:publisher Nfaa9fdb1c12948339ef8ccc6282b4b79
88 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000742082
89 https://doi.org/10.1007/978-3-642-40349-1_22
90 schema:sdDatePublished 2022-10-01T06:57
91 schema:sdLicense https://scigraph.springernature.com/explorer/license/
92 schema:sdPublisher N67dca072b0e54dbf8f945502f8830732
93 schema:url https://doi.org/10.1007/978-3-642-40349-1_22
94 sgo:license sg:explorer/license/
95 sgo:sdDataset chapters
96 rdf:type schema:Chapter
97 N009323f5251149ee8202aae0aed29cef rdf:first sg:person.012111562345.12
98 rdf:rest N9549fb8b667d4310a1d6275c48939623
99 N23533bba4b47432aaacd120fd11b6b2b rdf:first sg:person.016057442455.35
100 rdf:rest N009323f5251149ee8202aae0aed29cef
101 N2f0494d2556f43e9a661b2be36a88dfe schema:isbn 978-3-642-40348-4
102 978-3-642-40349-1
103 schema:name Cryptographic Hardware and Embedded Systems - CHES 2013
104 rdf:type schema:Book
105 N404a735ba7754e5eaf5dd13323e9569d rdf:first sg:person.07523201203.18
106 rdf:rest rdf:nil
107 N67dca072b0e54dbf8f945502f8830732 schema:name Springer Nature - SN SciGraph project
108 rdf:type schema:Organization
109 N6e9f4a58fdd4472296d4a21fceb35468 schema:familyName Bertoni
110 schema:givenName Guido
111 rdf:type schema:Person
112 N83dfba4b377841fd866df076a82c5391 schema:name dimensions_id
113 schema:value pub.1000742082
114 rdf:type schema:PropertyValue
115 N9549fb8b667d4310a1d6275c48939623 rdf:first sg:person.013206304341.94
116 rdf:rest N404a735ba7754e5eaf5dd13323e9569d
117 N95ae1d24f481443e822763a01f019a7b rdf:first N9bd6e5a6c9a540b8bc295a85f985787f
118 rdf:rest rdf:nil
119 N9a8332d9738340c1ae502b71795594b8 schema:name doi
120 schema:value 10.1007/978-3-642-40349-1_22
121 rdf:type schema:PropertyValue
122 N9bd6e5a6c9a540b8bc295a85f985787f schema:familyName Coron
123 schema:givenName Jean-Sébastien
124 rdf:type schema:Person
125 N9dc5bfe35b204f4c8c54f3790eaf3822 rdf:first N6e9f4a58fdd4472296d4a21fceb35468
126 rdf:rest N95ae1d24f481443e822763a01f019a7b
127 Nfaa9fdb1c12948339ef8ccc6282b4b79 schema:name Springer Nature
128 rdf:type schema:Organisation
129 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
130 schema:name Information and Computing Sciences
131 rdf:type schema:DefinedTerm
132 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
133 schema:name Data Format
134 rdf:type schema:DefinedTerm
135 sg:person.012111562345.12 schema:affiliation grid-institutes:grid.7942.8
136 schema:familyName Grosso
137 schema:givenName Vincent
138 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012111562345.12
139 rdf:type schema:Person
140 sg:person.013206304341.94 schema:affiliation grid-institutes:grid.5328.c
141 schema:familyName Naya-Plasencia
142 schema:givenName M.
143 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94
144 rdf:type schema:Person
145 sg:person.016057442455.35 schema:affiliation grid-institutes:grid.484080.0
146 schema:familyName Gérard
147 schema:givenName B.
148 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016057442455.35
149 rdf:type schema:Person
150 sg:person.07523201203.18 schema:affiliation grid-institutes:grid.7942.8
151 schema:familyName Standaert
152 schema:givenName François-Xavier
153 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07523201203.18
154 rdf:type schema:Person
155 grid-institutes:grid.484080.0 schema:alternateName Direction Générale de l’Armement, France
156 schema:name Direction Générale de l’Armement, France
157 ICTEAM/ELEN/Crypto Group, Université Catholique de Louvain, Belgium
158 rdf:type schema:Organization
159 grid-institutes:grid.5328.c schema:alternateName INRIA Paris-Rocquencourt, France
160 schema:name INRIA Paris-Rocquencourt, France
161 rdf:type schema:Organization
162 grid-institutes:grid.7942.8 schema:alternateName ICTEAM/ELEN/Crypto Group, Université Catholique de Louvain, Belgium
163 schema:name ICTEAM/ELEN/Crypto Group, Université Catholique de Louvain, Belgium
164 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...