Efficient Side-Channel Protections of ARX Ciphers

Authors

  • Bernhard Jungk Fraunhofer Singapore
  • Richard Petri Fraunhofer SIT
  • Marc Stöttinger Continental Teves

DOI:

https://doi.org/10.13154/tches.v2018.i3.627-653

Keywords:

Modular, Addition, Masking, Side-channel, Analysis, ChaCha20

Abstract

The current state of the art of Boolean masking for the modular addition operation in software has a very high performance overhead. Firstly, the instruction count is very high compared to a normal addition operation. Secondly, until recently, the entropy consumed by such protections was also quite high. Our paper significantly improves both aspects, by applying the Threshold Implementation (TI) methodology with two shares and by reusing internal values as randomness source in such a way that the uniformity is always preserved. Our approach performs considerably faster compared to the previously known masked addition and subtraction algorithms by Coron et al. and Biryukov et al. improving the state of the art by 36%, if we only consider the number of ARM assembly instructions. Furthermore, similar to the masked adder from Biryukov et al. we reduce the amount of randomness and only require one bit additional entroy per addition, which is a good trade-off for the improved performance. We applied our improved masked adder to ChaCha20, for which we provide two new first-order protected implementations and achieve a 36% improvement over the best published result for ChaCha20 using an ARM Cortex-M4 microprocessor.

Published

2018-08-16

Issue

Section

Articles

How to Cite

Efficient Side-Channel Protections of ARX Ciphers. (2018). IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018(3), 627-653. https://doi.org/10.13154/tches.v2018.i3.627-653