Stateless leakage resiliency from NLFSRs

Stateless cryptographic functions are required whenever the two communicating parties are not synchronized (have no memory of previous connection). It is widely accepted that these functions can only be efficiently secured against Side-Channel Analysis (SCA) using the regular countermeasures (masking and hiding). On the other hand, leakage resiliency tries to design new cryptographic functions with inherent security against SCA attacks. Generally, there are two methods to design stateless leakage resilient functions: tree structures and key-dependent algorithmic noise. Unfortunately, the first method is computationally intensive, while the current designs under the second method offer low security guarantees. In this paper, we follow the second approach to design a stateless leakage resilient function using non-linear feedback shift registers (NLFSRs). Our results show that the uncertainty on an n-bit key after any SCA attack exceeds n/2 bits, the birthday boundary, and can approach n bits, the brute-force boundary. We validate security of our structure with mathematical models and Monte Carlo simulation at noise-free conditions.

[1]  François-Xavier Standaert,et al.  Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices , 2010, AFRICACRYPT.

[2]  Patrick Schaumont,et al.  Side-channel countermeasure for SHA-3 at almost-zero area overhead , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[3]  Debdeep Mukhopadhyay,et al.  LFSR Based Stream Ciphers Are Vulnerable to Power Attacks , 2007, INDOCRYPT.

[4]  Christophe De Cannière,et al.  KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers , 2009, CHES.

[5]  Antoine Joux,et al.  Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs , 2012, CHES.

[6]  Florian Mendel,et al.  Side-Channel Analysis of Keymill , 2017, COSADE.

[7]  Thomas S. Messerges,et al.  Using Second-Order Power Analysis to Attack DPA Resistant Software , 2000, CHES.

[8]  Andrey Bogdanov,et al.  PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.

[9]  Stefan Mangard,et al.  Power analysis attacks - revealing the secrets of smart cards , 2007 .

[10]  Elena Dubrova,et al.  A List of Maximum Period NLFSRs , 2012, IACR Cryptol. ePrint Arch..

[11]  François-Xavier Standaert,et al.  Masking and leakage-resilient primitives: One, the other(s) or both? , 2015, Cryptography and Communications.

[12]  Stefan Mangard,et al.  Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability , 2016, CT-RSA.

[13]  Tim Güneysu,et al.  Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs , 2015, COSADE.

[14]  Abdulah Abdulah Zadeh,et al.  Simple power analysis applied to nonlinear feedback shift registers , 2014, IET Inf. Secur..

[15]  Megan Wachs,et al.  Gate-Level Masking under a Path-Based Leakage Metric , 2014, CHES.

[16]  Ch. Aravind Kumar,et al.  Key Updating for Leakage Resiliency with Application to AES Modes of Operation , 2016 .

[17]  Jason Smith,et al.  The SIMON and SPECK lightweight block ciphers , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[18]  Tim Güneysu,et al.  Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware , 2015, ACNS.

[19]  Oliver Kniffler,et al.  ACHTERBAHN-128/80 , 2006 .

[20]  Patrick Schaumont,et al.  Keymill: Side-Channel Resilient Key Generator , 2016, IACR Cryptol. ePrint Arch..

[21]  Kenneth H. Rosen,et al.  Discrete Mathematics and its applications , 2000 .

[22]  Stefan Mangard,et al.  Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis , 2014, Journal of Cryptographic Engineering.

[23]  Stefan Dziembowski,et al.  Leakage-Resilient Cryptography , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.