Side channel analysis of SPARX-64/128

Cryptanalysis and countermeasures

Sumesh Manjunath Ramesh, Hoda Alkhzaimi

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    SPARX family of lightweight block cipher was introduced in Asiacrypt 2016. The family consists of three variants (a) SPARX-64/128, (b) SPARX-128/128 and (c) SPARX-128/256. In this work, first, we propose a technique to perform Correlation Power Analysis (CPA) on the SPARX-64/128 cipher. Our technique uses a combination of first-order, second-order and modulo addition CPA methods. Using our proposed technique we extract 128 key bits of SPARX-64/128 cipher with low complexities in general; key guess complexity of 2 12 and 65000 ≈ 2 16 power traces. We initially propose a countermeasure of SPARX-64/128 block cipher against side-channel attacks in terms of power analysis, a threshold implementation based on a serialized design of SPARX-64/128 core. The serialized design of SPARX-64/128 core is implemented in hardware and occupies 60 slices in FPGA. As a countermeasure, this serialized implementation is extended to propose a provably secure threshold implementation of SPARX-64/128 core (TI-SPARX). The TI-SPARX core occupies 131 slices in FPGA and runs at 144 MHz thus, giving a throughput of 9 Mbps. To the best of our knowledge, this is the first side channel attack and countermeasure result on SPARX-64/128 cipher.

    Original languageEnglish (US)
    Title of host publicationProgress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Proceedings
    EditorsAbderrahmane Nitaj, Tajjeeddine Rachidi, Johannes Buchmann
    PublisherSpringer-Verlag
    Pages352-369
    Number of pages18
    ISBN (Print)9783030236953
    DOIs
    StatePublished - Jan 1 2019
    Event11th International Conference on the Theory and Applications of Cryptographic Techniques in africa, Africacrypt 2019 - Rabat, Morocco
    Duration: Jul 9 2019Jul 11 2019

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume11627 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference11th International Conference on the Theory and Applications of Cryptographic Techniques in africa, Africacrypt 2019
    CountryMorocco
    CityRabat
    Period7/9/197/11/19

    Fingerprint

    Side-channel Analysis
    Cryptanalysis
    Countermeasures
    Power Analysis
    Field programmable gate arrays (FPGA)
    Side Channel Attacks
    Block Cipher
    Correlation Analysis
    Slice
    Field Programmable Gate Array
    Throughput
    Hardware
    Guess
    Low Complexity
    Modulo
    Trace
    First-order
    Side channel attack
    Design
    Family

    Keywords

    • Correlation Power Analysis
    • Lightweight cryptography
    • Side channel analysis
    • SPARX
    • Threshold implementation

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • Computer Science(all)

    Cite this

    Ramesh, S. M., & Alkhzaimi, H. (2019). Side channel analysis of SPARX-64/128: Cryptanalysis and countermeasures. In A. Nitaj, T. Rachidi, & J. Buchmann (Eds.), Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Proceedings (pp. 352-369). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11627 LNCS). Springer-Verlag. https://doi.org/10.1007/978-3-030-23696-0_18

    Side channel analysis of SPARX-64/128 : Cryptanalysis and countermeasures. / Ramesh, Sumesh Manjunath; Alkhzaimi, Hoda.

    Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Proceedings. ed. / Abderrahmane Nitaj; Tajjeeddine Rachidi; Johannes Buchmann. Springer-Verlag, 2019. p. 352-369 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11627 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Ramesh, SM & Alkhzaimi, H 2019, Side channel analysis of SPARX-64/128: Cryptanalysis and countermeasures. in A Nitaj, T Rachidi & J Buchmann (eds), Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11627 LNCS, Springer-Verlag, pp. 352-369, 11th International Conference on the Theory and Applications of Cryptographic Techniques in africa, Africacrypt 2019, Rabat, Morocco, 7/9/19. https://doi.org/10.1007/978-3-030-23696-0_18
    Ramesh SM, Alkhzaimi H. Side channel analysis of SPARX-64/128: Cryptanalysis and countermeasures. In Nitaj A, Rachidi T, Buchmann J, editors, Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Proceedings. Springer-Verlag. 2019. p. 352-369. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-030-23696-0_18
    Ramesh, Sumesh Manjunath ; Alkhzaimi, Hoda. / Side channel analysis of SPARX-64/128 : Cryptanalysis and countermeasures. Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Proceedings. editor / Abderrahmane Nitaj ; Tajjeeddine Rachidi ; Johannes Buchmann. Springer-Verlag, 2019. pp. 352-369 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
    @inproceedings{9a1dc60135974a3bae875f105e98ef6a,
    title = "Side channel analysis of SPARX-64/128: Cryptanalysis and countermeasures",
    abstract = "SPARX family of lightweight block cipher was introduced in Asiacrypt 2016. The family consists of three variants (a) SPARX-64/128, (b) SPARX-128/128 and (c) SPARX-128/256. In this work, first, we propose a technique to perform Correlation Power Analysis (CPA) on the SPARX-64/128 cipher. Our technique uses a combination of first-order, second-order and modulo addition CPA methods. Using our proposed technique we extract 128 key bits of SPARX-64/128 cipher with low complexities in general; key guess complexity of 2 12 and 65000 ≈ 2 16 power traces. We initially propose a countermeasure of SPARX-64/128 block cipher against side-channel attacks in terms of power analysis, a threshold implementation based on a serialized design of SPARX-64/128 core. The serialized design of SPARX-64/128 core is implemented in hardware and occupies 60 slices in FPGA. As a countermeasure, this serialized implementation is extended to propose a provably secure threshold implementation of SPARX-64/128 core (TI-SPARX). The TI-SPARX core occupies 131 slices in FPGA and runs at 144{\^A} MHz thus, giving a throughput of 9 Mbps. To the best of our knowledge, this is the first side channel attack and countermeasure result on SPARX-64/128 cipher.",
    keywords = "Correlation Power Analysis, Lightweight cryptography, Side channel analysis, SPARX, Threshold implementation",
    author = "Ramesh, {Sumesh Manjunath} and Hoda Alkhzaimi",
    year = "2019",
    month = "1",
    day = "1",
    doi = "10.1007/978-3-030-23696-0_18",
    language = "English (US)",
    isbn = "9783030236953",
    series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
    publisher = "Springer-Verlag",
    pages = "352--369",
    editor = "Abderrahmane Nitaj and Tajjeeddine Rachidi and Johannes Buchmann",
    booktitle = "Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Proceedings",

    }

    TY - GEN

    T1 - Side channel analysis of SPARX-64/128

    T2 - Cryptanalysis and countermeasures

    AU - Ramesh, Sumesh Manjunath

    AU - Alkhzaimi, Hoda

    PY - 2019/1/1

    Y1 - 2019/1/1

    N2 - SPARX family of lightweight block cipher was introduced in Asiacrypt 2016. The family consists of three variants (a) SPARX-64/128, (b) SPARX-128/128 and (c) SPARX-128/256. In this work, first, we propose a technique to perform Correlation Power Analysis (CPA) on the SPARX-64/128 cipher. Our technique uses a combination of first-order, second-order and modulo addition CPA methods. Using our proposed technique we extract 128 key bits of SPARX-64/128 cipher with low complexities in general; key guess complexity of 2 12 and 65000 ≈ 2 16 power traces. We initially propose a countermeasure of SPARX-64/128 block cipher against side-channel attacks in terms of power analysis, a threshold implementation based on a serialized design of SPARX-64/128 core. The serialized design of SPARX-64/128 core is implemented in hardware and occupies 60 slices in FPGA. As a countermeasure, this serialized implementation is extended to propose a provably secure threshold implementation of SPARX-64/128 core (TI-SPARX). The TI-SPARX core occupies 131 slices in FPGA and runs at 144 MHz thus, giving a throughput of 9 Mbps. To the best of our knowledge, this is the first side channel attack and countermeasure result on SPARX-64/128 cipher.

    AB - SPARX family of lightweight block cipher was introduced in Asiacrypt 2016. The family consists of three variants (a) SPARX-64/128, (b) SPARX-128/128 and (c) SPARX-128/256. In this work, first, we propose a technique to perform Correlation Power Analysis (CPA) on the SPARX-64/128 cipher. Our technique uses a combination of first-order, second-order and modulo addition CPA methods. Using our proposed technique we extract 128 key bits of SPARX-64/128 cipher with low complexities in general; key guess complexity of 2 12 and 65000 ≈ 2 16 power traces. We initially propose a countermeasure of SPARX-64/128 block cipher against side-channel attacks in terms of power analysis, a threshold implementation based on a serialized design of SPARX-64/128 core. The serialized design of SPARX-64/128 core is implemented in hardware and occupies 60 slices in FPGA. As a countermeasure, this serialized implementation is extended to propose a provably secure threshold implementation of SPARX-64/128 core (TI-SPARX). The TI-SPARX core occupies 131 slices in FPGA and runs at 144 MHz thus, giving a throughput of 9 Mbps. To the best of our knowledge, this is the first side channel attack and countermeasure result on SPARX-64/128 cipher.

    KW - Correlation Power Analysis

    KW - Lightweight cryptography

    KW - Side channel analysis

    KW - SPARX

    KW - Threshold implementation

    UR - http://www.scopus.com/inward/record.url?scp=85069201949&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=85069201949&partnerID=8YFLogxK

    U2 - 10.1007/978-3-030-23696-0_18

    DO - 10.1007/978-3-030-23696-0_18

    M3 - Conference contribution

    SN - 9783030236953

    T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    SP - 352

    EP - 369

    BT - Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Proceedings

    A2 - Nitaj, Abderrahmane

    A2 - Rachidi, Tajjeeddine

    A2 - Buchmann, Johannes

    PB - Springer-Verlag

    ER -