Parallel sponge-based authenticated encryption with side-channel protection and adversary-invisible nonces

Since its birth in 2000, authenticated encryption (AE) has been a hot research topic, and many new features have been proposed to boost its security or performance. The Block cipher was the dominant primitive in constructing AE schemes, followed by stream ciphers and compression functions until the...

Full description

Saved in:
Bibliographic Details
Main Authors: Jimale, Mohamud Ahmed, Z'aba, Muhammad Reza, Mat Kiah, Miss Laiha, Idris, Mohd Yamani Idna, Jamil, Norziana, Mohamad, Moesfa Soeheila, Rohmad, Mohd Saufy
Format: Article
Published: IEEE-Inst Electrical Electronics Engineers Inc 2022
Subjects:
Online Access:http://eprints.um.edu.my/43092/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Since its birth in 2000, authenticated encryption (AE) has been a hot research topic, and many new features have been proposed to boost its security or performance. The Block cipher was the dominant primitive in constructing AE schemes, followed by stream ciphers and compression functions until the sponge construction emerged in 2011. Sponge-based AE schemes provide functional characteristics such as parallelizability, incrementality, and being online. They also offer security features for protection against active or passive adversaries. Currently, there exist parallel sponge-based AE schemes, but they are not protected against simple power analysis (SPA) and differential power analysis (DPA). On the other hand, sponge-based AE schemes that protect against such attacks are serial and cannot be parallelized. Furthermore, sponge-based AE schemes handle the nonces in a way that could allow misuse. So, sponge-based AE schemes that hide the nonce from adversaries are also an open problem. This work aims to bridge these gaps by proposing a parallel sponge-based AE with side-channel protection and adversary-invisible nonces (PSASPIN), using parallel fresh rekeying and the duplex mode of the sponge construction. A leveled implementation is used to implement the key generation part using a pseudorandom function (PRF) based on the Galois field multiplication. The data processing (the rekeyed) part is implemented using the sponge-based duplex mode. Finally, the security proof of the proposed scheme is provided using game-based theory according to the PRP/PRF switching lemma, and its performance is analyzed.