Ascon hardware implementations and side-channel evaluation

Hannes Groß, Erich Wenger, Christoph Dobraunig, Christoph Ehrenhöfer

Research output: Contribution to journalArticleResearchpeer-review

Abstract

Having ciphers that provide confidentiality and authenticity, that are fast in software and efficient in hardware, these are the goals of CAESAR, the Competition for Authenticated Encryption: Security, Applicability, and Robustness. In this paper, the CAESAR candidate Ascon is implemented in hardware and optimized for different typical applications to fully explore Ascon’s design space. Thus, we are able to present hardware implementations of Ascon suitable for RFID tags, Wireless Sensor Nodes, Embedded Systems, and applications that need maximum performance. For instance, we show that an Ascon implementation with a single unrolled round transformation is only 7 kGE large, but can process up to 5.5Gbit/sec of data (0.75 cycles/byte), which is already enough to encrypt a Gigabit Ethernet connection. Besides, Ascon is not only fast and small, it can also be easily protected against DPA attacks. A threshold implementation of Ascon just requires about 8 kGE of chip area, which is only 3.1 times larger than the unprotected low-area optimized implementation.
Original languageEnglish
Pages (from-to)470-479
Number of pages10
JournalMicroprocessors and microsystems - Embedded Hardware Design
Volume52
DOIs
Publication statusPublished - 2017

Fingerprint

Hardware
Ethernet
Radio frequency identification (RFID)
Sensor nodes
Embedded systems
Cryptography

Keywords

  • Authenticated encryption
  • CAESAR competition
  • Hardware design
  • Threshold implementation
  • Ascon

Cite this

Ascon hardware implementations and side-channel evaluation. / Groß, Hannes; Wenger, Erich; Dobraunig, Christoph; Ehrenhöfer, Christoph.

In: Microprocessors and microsystems - Embedded Hardware Design, Vol. 52, 2017, p. 470-479.

Research output: Contribution to journalArticleResearchpeer-review

Groß, Hannes ; Wenger, Erich ; Dobraunig, Christoph ; Ehrenhöfer, Christoph. / Ascon hardware implementations and side-channel evaluation. In: Microprocessors and microsystems - Embedded Hardware Design. 2017 ; Vol. 52. pp. 470-479.
@article{a17babd3215c463ab8a374e2c1136eaa,
title = "Ascon hardware implementations and side-channel evaluation",
abstract = "Having ciphers that provide confidentiality and authenticity, that are fast in software and efficient in hardware, these are the goals of CAESAR, the Competition for Authenticated Encryption: Security, Applicability, and Robustness. In this paper, the CAESAR candidate Ascon is implemented in hardware and optimized for different typical applications to fully explore Ascon’s design space. Thus, we are able to present hardware implementations of Ascon suitable for RFID tags, Wireless Sensor Nodes, Embedded Systems, and applications that need maximum performance. For instance, we show that an Ascon implementation with a single unrolled round transformation is only 7 kGE large, but can process up to 5.5Gbit/sec of data (0.75 cycles/byte), which is already enough to encrypt a Gigabit Ethernet connection. Besides, Ascon is not only fast and small, it can also be easily protected against DPA attacks. A threshold implementation of Ascon just requires about 8 kGE of chip area, which is only 3.1 times larger than the unprotected low-area optimized implementation.",
keywords = "Authenticated encryption, CAESAR competition, Hardware design, Threshold implementation, Ascon",
author = "Hannes Gro{\ss} and Erich Wenger and Christoph Dobraunig and Christoph Ehrenh{\"o}fer",
year = "2017",
doi = "10.1016/j.micpro.2016.10.006",
language = "English",
volume = "52",
pages = "470--479",
journal = "Microprocessors and microsystems - Embedded Hardware Design",
issn = "0141-9331",
publisher = "Elsevier B.V.",

}

TY - JOUR

T1 - Ascon hardware implementations and side-channel evaluation

AU - Groß, Hannes

AU - Wenger, Erich

AU - Dobraunig, Christoph

AU - Ehrenhöfer, Christoph

PY - 2017

Y1 - 2017

N2 - Having ciphers that provide confidentiality and authenticity, that are fast in software and efficient in hardware, these are the goals of CAESAR, the Competition for Authenticated Encryption: Security, Applicability, and Robustness. In this paper, the CAESAR candidate Ascon is implemented in hardware and optimized for different typical applications to fully explore Ascon’s design space. Thus, we are able to present hardware implementations of Ascon suitable for RFID tags, Wireless Sensor Nodes, Embedded Systems, and applications that need maximum performance. For instance, we show that an Ascon implementation with a single unrolled round transformation is only 7 kGE large, but can process up to 5.5Gbit/sec of data (0.75 cycles/byte), which is already enough to encrypt a Gigabit Ethernet connection. Besides, Ascon is not only fast and small, it can also be easily protected against DPA attacks. A threshold implementation of Ascon just requires about 8 kGE of chip area, which is only 3.1 times larger than the unprotected low-area optimized implementation.

AB - Having ciphers that provide confidentiality and authenticity, that are fast in software and efficient in hardware, these are the goals of CAESAR, the Competition for Authenticated Encryption: Security, Applicability, and Robustness. In this paper, the CAESAR candidate Ascon is implemented in hardware and optimized for different typical applications to fully explore Ascon’s design space. Thus, we are able to present hardware implementations of Ascon suitable for RFID tags, Wireless Sensor Nodes, Embedded Systems, and applications that need maximum performance. For instance, we show that an Ascon implementation with a single unrolled round transformation is only 7 kGE large, but can process up to 5.5Gbit/sec of data (0.75 cycles/byte), which is already enough to encrypt a Gigabit Ethernet connection. Besides, Ascon is not only fast and small, it can also be easily protected against DPA attacks. A threshold implementation of Ascon just requires about 8 kGE of chip area, which is only 3.1 times larger than the unprotected low-area optimized implementation.

KW - Authenticated encryption

KW - CAESAR competition

KW - Hardware design

KW - Threshold implementation

KW - Ascon

U2 - 10.1016/j.micpro.2016.10.006

DO - 10.1016/j.micpro.2016.10.006

M3 - Article

VL - 52

SP - 470

EP - 479

JO - Microprocessors and microsystems - Embedded Hardware Design

JF - Microprocessors and microsystems - Embedded Hardware Design

SN - 0141-9331

ER -