Toolchain for Timing Leakage Analysis of NIST Lightweight Crypto Candidates

Research output: Contribution to conferenceConference abstract for conferenceResearchpeer-review

Abstract

With recent advances in IoT technology and lightweight devices, an ever increasing number of highly constrained systems now
communicate over networks. Modern cryptographic algorithms are often
poorly suited to the limitations of such devices, which has led to NIST
publishing a call for algorithms to be considered for new lightweight
standards.

As such devices are often deployed into adversarial environments, and
may not have the luxury of large caches, or hardware support for cryptographic primitives, proper side channel resistance is an important property for any new standard. We have collected a set of side channel analysis
tools, and used them to evaluate all 32 candidates in the second round
of the standardization process.

We provide the results of running our toolchain on all reference implementations, and show some of the timing leakages and design patterns
we discovered, and discuss the strengths and weaknesses of the various
tools.

We have compiled our toolchain into an easy to use Docker image targeting the competition API, which we have made available for candidates
to use for development purposes for the rest of the competition. Our
pipeline is available at GitHub
Original languageEnglish
Publication dateOct 2020
Publication statusPublished - Oct 2020
EventNIST Lightweight Cryptography Workshop 2020 - Virtual
Duration: 19 Oct 202021 Oct 2020
https://csrc.nist.gov/Events/2020/lightweight-cryptography-workshop-2020

Workshop

WorkshopNIST Lightweight Cryptography Workshop 2020
LocationVirtual
Period19/10/202021/10/2020
Internet address

Fingerprint

Dive into the research topics of 'Toolchain for Timing Leakage Analysis of NIST Lightweight Crypto Candidates'. Together they form a unique fingerprint.

Cite this