Cargando…

MEAS: memory encryption and authentication secure against side-channel attacks

Memory encryption is used in many devices to protect memory content from attackers with physical access to a device. However, many current memory encryption schemes can be broken using differential power analysis (DPA). In this work, we present Meas—the first Memory Encryption and Authentication Sch...

Descripción completa

Detalles Bibliográficos
Autores principales: Unterluggauer, Thomas, Werner, Mario, Mangard, Stefan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer Berlin Heidelberg 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6555441/
https://www.ncbi.nlm.nih.gov/pubmed/31231603
http://dx.doi.org/10.1007/s13389-018-0180-2
_version_ 1783425153550516224
author Unterluggauer, Thomas
Werner, Mario
Mangard, Stefan
author_facet Unterluggauer, Thomas
Werner, Mario
Mangard, Stefan
author_sort Unterluggauer, Thomas
collection PubMed
description Memory encryption is used in many devices to protect memory content from attackers with physical access to a device. However, many current memory encryption schemes can be broken using differential power analysis (DPA). In this work, we present Meas—the first Memory Encryption and Authentication Scheme providing security against DPA attacks. The scheme combines ideas from fresh re-keying and authentication trees by storing encryption keys in a tree structure to thwart first-order DPA without the need for DPA-protected cryptographic primitives. Therefore, the design strictly limits the use of every key to encrypt at most two different plaintext values. Meas prevents higher-order DPA without changes to the cipher implementation by using masking of the plaintext values. Meas is applicable to all kinds of memory, e.g., NVM and RAM. For RAM, we give two concrete Meas instances based on the lightweight primitives Ascon, PRINCE, and QARMA. We implement and evaluate both instances on a Zynq XC7Z020 FPGA showing that Meas has memory and performance overhead comparable to existing memory authentication techniques without DPA protection.
format Online
Article
Text
id pubmed-6555441
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher Springer Berlin Heidelberg
record_format MEDLINE/PubMed
spelling pubmed-65554412019-06-21 MEAS: memory encryption and authentication secure against side-channel attacks Unterluggauer, Thomas Werner, Mario Mangard, Stefan J Cryptogr Eng Regular Paper Memory encryption is used in many devices to protect memory content from attackers with physical access to a device. However, many current memory encryption schemes can be broken using differential power analysis (DPA). In this work, we present Meas—the first Memory Encryption and Authentication Scheme providing security against DPA attacks. The scheme combines ideas from fresh re-keying and authentication trees by storing encryption keys in a tree structure to thwart first-order DPA without the need for DPA-protected cryptographic primitives. Therefore, the design strictly limits the use of every key to encrypt at most two different plaintext values. Meas prevents higher-order DPA without changes to the cipher implementation by using masking of the plaintext values. Meas is applicable to all kinds of memory, e.g., NVM and RAM. For RAM, we give two concrete Meas instances based on the lightweight primitives Ascon, PRINCE, and QARMA. We implement and evaluate both instances on a Zynq XC7Z020 FPGA showing that Meas has memory and performance overhead comparable to existing memory authentication techniques without DPA protection. Springer Berlin Heidelberg 2018-01-25 2019 /pmc/articles/PMC6555441/ /pubmed/31231603 http://dx.doi.org/10.1007/s13389-018-0180-2 Text en © The Author(s) 2018 Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
spellingShingle Regular Paper
Unterluggauer, Thomas
Werner, Mario
Mangard, Stefan
MEAS: memory encryption and authentication secure against side-channel attacks
title MEAS: memory encryption and authentication secure against side-channel attacks
title_full MEAS: memory encryption and authentication secure against side-channel attacks
title_fullStr MEAS: memory encryption and authentication secure against side-channel attacks
title_full_unstemmed MEAS: memory encryption and authentication secure against side-channel attacks
title_short MEAS: memory encryption and authentication secure against side-channel attacks
title_sort meas: memory encryption and authentication secure against side-channel attacks
topic Regular Paper
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6555441/
https://www.ncbi.nlm.nih.gov/pubmed/31231603
http://dx.doi.org/10.1007/s13389-018-0180-2
work_keys_str_mv AT unterluggauerthomas measmemoryencryptionandauthenticationsecureagainstsidechannelattacks
AT wernermario measmemoryencryptionandauthenticationsecureagainstsidechannelattacks
AT mangardstefan measmemoryencryptionandauthenticationsecureagainstsidechannelattacks