Computer Science ›› 2015, Vol. 42 ›› Issue (3): 148-152.doi: 10.11896/j.issn.1002-137X.2015.03.031

Previous Articles     Next Articles

Fast Implementation of KLEIN for Resisting Timing and Cache Side-channel Attacks on AVR

WEN Ya-min, LI Feng-xia, GONG Zheng and TANG Shao-hua   

  • Online:2018-11-14 Published:2018-11-14

Abstract: With the rapid development of IoT (Internet of Things) applications,lightweight block ciphers are widely focused in the applications of resource-constrained environments.In IoT applications,attackers often use side-channel information to recover secret keys.At RFIDSec 2011,Gong et al.proposed a new lightweight block cipher named KLEIN for the software implementation in resource-constrained environments.We proposed a bitslicing implementation of the KLEIN block cipher based on AVR ASM.In the implementation,look-up tables and logical operations are combined for reducing the computational costs in the MixNibbles step,which leads to a better balance between the algorithm’s speed and storage.Our experiments on AVR show the bitslicing implementation of KLEIN is feasible for practical applications.

Key words: IoT,Side-channel attack,Lightweight block cipher,KLEIN,Bitslicing

[1] Gong Z,Nikova S,Law Y.KLEIN:A New Family of Lightweight Block Ciphers[C]∥Proceeding of RFID Security and Privacy 2011.Berlin Heidlberg:Springer,2011:1-18
[2] Bogdanov A,Knudsen L R,Leander G,et al.PRESENT:An Ultra-Lightweight Block Cipher[C]∥Proceeding of CHES 2007.Berlin Heidlberg:Springer,2007:450-466
[3] Nakahara,Jr J.Fast Variants of the MESH Block Ciphers[C]∥Proceeding of Indocrypt 2004.Berlin Heidlberg:Springer,2004:162-174
[4] Nakahara,Jr J,Rijmen V,et al.The MESH Block Ciphers[C]∥Proceeding of the International Workshop on Info.Security Applications,WISA 2003.Berlin Heidlberg:Springer,2003:458-473
[5] Poschmann A.Lightweight Cryptography- Cryptographic Engineering for a Pervasive World[D].Germany:Ruhr-University Bochum.February 2009
[6] Konighofer R.A Fast and Cache-Timing Resistant Implementation of the AES[C]∥Proceeding of CT-RSA 2008.Berlin Heidlberg:Springer,2008:187-202
[7] Moradi A,Poschmann A,Ling S,et al.Pushing the limits:AVery Compact and A Threshold Implementation of AES[C]∥Proceeding of Eurocrypt 2011.Berlin Heidlberg:Springer,2011:69-88
[8] Biham E.A fast new DES implementation in software[C]∥Proceeding of FSE 1997.Berlin Heidlberg:Springer,1997:260-272
[9] Neve M,Seifert J P.Advances on access-driven cache attacks on AES[C]∥Proceeding of SAC 2006.Berlin Heidlberg:Springer,2007:147-162
[10] Osvik D A,Shamir A,Tromer E.Cache attacks and counter-measures:The case of AES[C]∥Proceeding of CT-RSA 2006.Berlin Heidlberg:Sprin-ger,2006:1-20
[11] Bonneau J,Mironov I.Cache-collision timing attacks againstAES[C]∥Proceeding of CHES 2006.Berlin Heidlberg:Sprin-ger,2006:201-215
[12] Aciic O,Schindler W,Koc C.Cache based remote timing attack on the AES[C]∥Proceeding of CT-RSA 2007.Berlin Heidlberg:Springer,2006:271-286
[13] 赵新杰,王韬,矫文成,等.一种新的针对AES的访问驱动Cache攻击[J].小型微型计算机系统,2009,30(4):797-800
[14] 赵新杰,王韬,郑媛媛.Camellia访问驱动Cache计时攻击研究[J].计算机学报,2010,33(7):1153-1165
[15] 赵新杰,王韬,郭世泽,等.AES访问驱动Cache计时攻击[J].软件学报,2011(3):572-591
[16] 赵新杰,王韬,郭世泽,等.分组密码Cache攻击技术研究[J].计算机研究与发展,2012,49(3):453-468
[17] 温雅敏,龚征,胡沐创,等.面向ATtiny微处理器的KLEIN分组密码算法实现[J].小型微型计算机系统,2013,34(7):1641-1644

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!