[go: up one dir, main page]

What a lovely hat

Is it made out of tin foil?

Paper 2017/395

Higher-Order Side-Channel Protected Implementations of Keccak

Hannes Gross, David Schaffenrath, and Stefan Mangard

Abstract

The efficient protection of security critical devices against side-channel analysis attacks is a fundamental need in the age of Internet of Things and ubiquitous computing. In this work, we introduce a configurable hardware design of Keccak (SHA-3) which can be tailored to fulfill the needs of a wide range of different applications. Our Keccak design is therefore equipped with generic side-channel protection capabilities. The design can thus be synthesized for any desired protection level by just changing one design parameter. Regardless of its generic appearance, the introduced Keccak design yields the smallest (15.7 kGE) firstorder protected Keccak implementation published to this date. Furthermore, it is to the best of our knowledge the first higher-order side-channel resistant implementation of Keccak. In total, we state results for four different Keccak variants up to the ninth protection order.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Minor revision. Euromicro Conference on Digital System Design (DSD 2017)
Keywords
KeccakSHA-3maskingdomain-oriented maskingthreshold implementationsDPA
Contact author(s)
hannes gross @ iaik tugraz at
History
2017-11-15: revised
2017-05-09: received
See all versions
Short URL
https://ia.cr/2017/395
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2017/395,
      author = {Hannes Gross and David Schaffenrath and Stefan Mangard},
      title = {Higher-Order Side-Channel Protected Implementations of Keccak},
      howpublished = {Cryptology {ePrint} Archive, Paper 2017/395},
      year = {2017},
      url = {https://eprint.iacr.org/2017/395}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.