Visible to the public DPA on Hardware Implementations of Ascon and Keyak

TitleDPA on Hardware Implementations of Ascon and Keyak
Publication TypeConference Paper
Year of Publication2017
AuthorsSamwel, Niels, Daemen, Joan
Conference NameProceedings of the Computing Frontiers Conference
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4487-6
KeywordsAscon, composability, Differential Power Analysis, Hardware implementations, Keccak, Keyak, Metrics, Microelectronic Security, Microelectronics Security, pubcrawl, resilience, Resiliency
Abstract

This work applies side channel analysis on hardware implementations of two CAESAR candidates, Keyak and Ascon. Both algorithms are cryptographic sponges with an iterated permutation. The algorithms share an s-box so attacks on the non-linear step of the permutation are similar. This work presents the first results of a DPA attack on Keyak using traces generated by an FPGA. A new attack is crafted for a larger sensitive variable to reduce the number of traces. It also presents and applies the first CPA attack on Ascon. Using a toy-sized threshold implementation of Ascon we try to give insight in the order of the steps of a permutation.

URLhttp://doi.acm.org/10.1145/3075564.3079067
DOI10.1145/3075564.3079067
Citation Keysamwel_dpa_2017