Worcester Polytechnic Institute

Upcoming Seminar: Mostafa Taha

Thursday, July 3 at 11am in AK 218:

Advances in the Side-Channel Analysis of Symmetric Cryptography
Presenter: Mostafa Taha (Worcester Polytechnic Institute)

Practical countermeasures against Side-Channel Attacks (Hiding and Masking) typically require at least doubling the implementation area or the computation time. Yet, they do not provide perfect protection. They only make it harder for an adversary to recover the secret key. On the other hand, Leakage Resiliency can provide provable security against SCA by designing new primitives with inherent resiliency against information leak. However, Leakage Resiliency comes with excessive implementation overhead that makes it unacceptable for embedded devices.

In this talk we highlight a generic framework for lightweight and efficient leakage resiliency through key-updating. Then, we propose two complete solutions that are compatible with any AES mode of operation. One solution uses a dedicated circuit for key-updating, while the other uses the underlying AES block cipher itself. Also, we address the problem of designing a single core for all the applications of hashing functions: unkeyed applications e.g. regular hashing and keyed applications e.g. generating MACs. We observed that, running unkeyed application on an SCA-protected core will involve a huge loss of resources (3 to 4x). Hence, we propose a novel SCA-protected core for hashing following the concepts of Leakage Resiliency. Our core has no overhead in unkeyed applications, and negligible overhead in keyed ones.

Mostafa Taha is a Post Doctoral Fellow in the Vernam Group of WPI. He received his Ph.D. degree from the Secure Embedded Systems Lab at Virginia Polytechnic Institute and State University, better known as Virginia Tech. His research focus on implementation attacks and side-channel analysis.

Applied Cryptology Seminar
The seminar features presentations of hot topics within the
interdisciplinary field of cyber-security.

All are welcome!

For current information on the seminar, please visit: