Activities per year
Abstract
With recent advances in IoT technology and lightweight devices, an ever increasing number of highly constrained systems now
communicate over networks. Modern cryptographic algorithms are often
poorly suited to the limitations of such devices, which has led to NIST
publishing a call for algorithms to be considered for new lightweight
standards.
As such devices are often deployed into adversarial environments, and
may not have the luxury of large caches, or hardware support for cryptographic primitives, proper side channel resistance is an important property for any new standard. We have collected a set of side channel analysis
tools, and used them to evaluate all 32 candidates in the second round
of the standardization process.
We provide the results of running our toolchain on all reference implementations, and show some of the timing leakages and design patterns
we discovered, and discuss the strengths and weaknesses of the various
tools.
We have compiled our toolchain into an easy to use Docker image targeting the competition API, which we have made available for candidates
to use for development purposes for the rest of the competition. Our
pipeline is available at GitHub
communicate over networks. Modern cryptographic algorithms are often
poorly suited to the limitations of such devices, which has led to NIST
publishing a call for algorithms to be considered for new lightweight
standards.
As such devices are often deployed into adversarial environments, and
may not have the luxury of large caches, or hardware support for cryptographic primitives, proper side channel resistance is an important property for any new standard. We have collected a set of side channel analysis
tools, and used them to evaluate all 32 candidates in the second round
of the standardization process.
We provide the results of running our toolchain on all reference implementations, and show some of the timing leakages and design patterns
we discovered, and discuss the strengths and weaknesses of the various
tools.
We have compiled our toolchain into an easy to use Docker image targeting the competition API, which we have made available for candidates
to use for development purposes for the rest of the competition. Our
pipeline is available at GitHub
Original language | English |
---|---|
Publication date | Oct 2020 |
Publication status | Published - Oct 2020 |
Event | NIST Lightweight Cryptography Workshop 2020 - Virtual Duration: 19 Oct 2020 → 21 Oct 2020 https://csrc.nist.gov/Events/2020/lightweight-cryptography-workshop-2020 |
Workshop
Workshop | NIST Lightweight Cryptography Workshop 2020 |
---|---|
Location | Virtual |
Period | 19/10/2020 → 21/10/2020 |
Internet address |
Fingerprint
Dive into the research topics of 'Toolchain for Timing Leakage Analysis of NIST Lightweight Crypto Candidates'. Together they form a unique fingerprint.Activities
- 1 Lecture and oral contribution
-
Toolchain for Timing Leakage Analysis of NIST Lightweight Crypto Candidates
Blatchley Hansen, A. (Lecturer)
21 Oct 2020Activity: Talk or presentation types › Lecture and oral contribution