Abstract
Currently NIST is working towards the standardization of lightweight cryptography (LWC). Although the cryptanalytic strength of LWC is currently under deep scrutiny, the LWC implementation security has not been yet widely explored. GIFT block cipher is the main building block of many of the LWC NIST candidates and therefore has the potential to be part of the next lightweight crypto-standard. Hence it is important to understand its implementation vulnerabilities such as side-channel attacks (SCAs). Although SCAs have been evaluated for hardware implementations, no analysis or countermeasures have been proposed yet for software implementations. This work evaluates GIFT 128-bit software implementations (protected and unprotected) against power-based SCAs. Our protected implementation is based on a new lightweight countermeasure consisting of two balanced and masked SBoxes. Our results show that GIFT's SBox (or SubCell function) is vulnerable against profiled and non-profiled attacks when unprotected or protected implementations based on existing balancing or masking techniques are used. On the other hand, our proposed countermeasure that smartly combines balancing and masking offers full protection with negligible overhead.
Original language | English |
---|---|
Title of host publication | 2022 IEEE 40th VLSI Test Symposium (VTS) |
Number of pages | 6 |
ISBN (Electronic) | 978-1-6654-1060-1 |
DOIs | |
Publication status | Published - 2022 |
Event | 40th IEEE VLSI Test Symposium, VTS 2022 - Virtual, Online, United States Duration: 25 Apr 2022 → 27 Apr 2022 |
Conference
Conference | 40th IEEE VLSI Test Symposium, VTS 2022 |
---|---|
Country/Territory | United States |
City | Virtual, Online |
Period | 25/04/22 → 27/04/22 |
Keywords
- Lightweight cipher
- Side channel analysis
- GIFT
- Deep Learning
- Countermeasure