Parallel sponge-based authenticated encryption with side-channel protection and adversary-invisible nonces

Jimale, Mohamud Ahmed and Z'aba, Muhammad Reza and Mat Kiah, Miss Laiha and Idris, Mohd Yamani Idna and Jamil, Norziana and Mohamad, Moesfa Soeheila and Rohmad, Mohd Saufy (2022) Parallel sponge-based authenticated encryption with side-channel protection and adversary-invisible nonces. IEEE Access, 10. pp. 50819-50838. ISSN 2169-3536, DOI https://doi.org/10.1109/ACCESS.2022.3171853.

Full text not available from this repository.

Abstract

Since its birth in 2000, authenticated encryption (AE) has been a hot research topic, and many new features have been proposed to boost its security or performance. The Block cipher was the dominant primitive in constructing AE schemes, followed by stream ciphers and compression functions until the sponge construction emerged in 2011. Sponge-based AE schemes provide functional characteristics such as parallelizability, incrementality, and being online. They also offer security features for protection against active or passive adversaries. Currently, there exist parallel sponge-based AE schemes, but they are not protected against simple power analysis (SPA) and differential power analysis (DPA). On the other hand, sponge-based AE schemes that protect against such attacks are serial and cannot be parallelized. Furthermore, sponge-based AE schemes handle the nonces in a way that could allow misuse. So, sponge-based AE schemes that hide the nonce from adversaries are also an open problem. This work aims to bridge these gaps by proposing a parallel sponge-based AE with side-channel protection and adversary-invisible nonces (PSASPIN), using parallel fresh rekeying and the duplex mode of the sponge construction. A leveled implementation is used to implement the key generation part using a pseudorandom function (PRF) based on the Galois field multiplication. The data processing (the rekeyed) part is implemented using the sponge-based duplex mode. Finally, the security proof of the proposed scheme is provided using game-based theory according to the PRP/PRF switching lemma, and its performance is analyzed.

Item Type: Article
Funders: Fundamental Research Grant Scheme (FRGS) of the Ministry of Higher Education, Malaysia [Grant No: FP072-2019A & FRGS/1/2019/ICT05/UM/02/1]
Uncontrolled Keywords: Cryptography; Security; Encryption; Ciphers; NIST; Codes; Authentication; Integrity; Authenticated encryption; Authentication; Confidentiality; CAESAR competition; Message authentication code; NIST-LW competition; Cryptographic sponge function
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
T Technology > T Technology (General)
T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisions: Faculty of Computer Science & Information Technology > Department of Computer System & Technology
Depositing User: Ms. Juhaida Abd Rahim
Date Deposited: 29 Aug 2023 07:52
Last Modified: 29 Aug 2023 07:52
URI: http://eprints.um.edu.my/id/eprint/43092

Actions (login required)

View Item View Item