MEAS: memory encryption and authentication secure against side-channel attacks

Thomas Unterluggauer, Mario Werner, Stefan Mangard

Research output: Contribution to journalArticleResearchpeer-review

Abstract

Memory encryption is used in many devices to protect memory content from attackers with physical access to a device. However, many current memory encryption schemes can be broken using differential power analysis (DPA). In this work, we present Meas—the first Memory Encryption and Authentication Scheme providing security against DPA attacks. The scheme combines ideas from fresh re-keying and authentication trees by storing encryption keys in a tree structure to thwart first-order DPA without the need for DPA-protected cryptographic primitives. Therefore, the design strictly limits the use of every key to encrypt at most two different plaintext values. Meas prevents higher-order DPA without changes to the cipher implementation by using masking of the plaintext values. Meas is applicable to all kinds of memory, e.g., NVM and RAM. For RAM, we give two concrete Meas instances based on the lightweight primitives Ascon, PRINCE, and QARMA. We implement and evaluate both instances on a Zynq XC7Z020 FPGA showing that Meas has memory and performance overhead comparable to existing memory authentication techniques without DPA protection.
Original languageEnglish
Pages (from-to)1-22
JournalJournal of cryptographic engineering
DOIs
Publication statusPublished - 25 Jan 2018

Fingerprint

Authentication
Cryptography
Data storage equipment
Random access storage
Side channel attack
Field programmable gate arrays (FPGA)
Concretes

Keywords

  • side-channel attack
  • DPA
  • Memory
  • Encryption
  • Authentication

Cite this

MEAS: memory encryption and authentication secure against side-channel attacks. / Unterluggauer, Thomas; Werner, Mario; Mangard, Stefan.

In: Journal of cryptographic engineering, 25.01.2018, p. 1-22.

Research output: Contribution to journalArticleResearchpeer-review

@article{129cecfe8a8e49bc833f87d2907055a2,
title = "MEAS: memory encryption and authentication secure against side-channel attacks",
abstract = "Memory encryption is used in many devices to protect memory content from attackers with physical access to a device. However, many current memory encryption schemes can be broken using differential power analysis (DPA). In this work, we present Meas—the first Memory Encryption and Authentication Scheme providing security against DPA attacks. The scheme combines ideas from fresh re-keying and authentication trees by storing encryption keys in a tree structure to thwart first-order DPA without the need for DPA-protected cryptographic primitives. Therefore, the design strictly limits the use of every key to encrypt at most two different plaintext values. Meas prevents higher-order DPA without changes to the cipher implementation by using masking of the plaintext values. Meas is applicable to all kinds of memory, e.g., NVM and RAM. For RAM, we give two concrete Meas instances based on the lightweight primitives Ascon, PRINCE, and QARMA. We implement and evaluate both instances on a Zynq XC7Z020 FPGA showing that Meas has memory and performance overhead comparable to existing memory authentication techniques without DPA protection.",
keywords = "side-channel attack, DPA, Memory, Encryption, Authentication",
author = "Thomas Unterluggauer and Mario Werner and Stefan Mangard",
year = "2018",
month = "1",
day = "25",
doi = "https://doi.org/10.1007/s13389-018-0180-2",
language = "English",
pages = "1--22",
journal = "Journal of cryptographic engineering",
issn = "2190-8516",
publisher = "Springer Science + Business Media",

}

TY - JOUR

T1 - MEAS: memory encryption and authentication secure against side-channel attacks

AU - Unterluggauer, Thomas

AU - Werner, Mario

AU - Mangard, Stefan

PY - 2018/1/25

Y1 - 2018/1/25

N2 - Memory encryption is used in many devices to protect memory content from attackers with physical access to a device. However, many current memory encryption schemes can be broken using differential power analysis (DPA). In this work, we present Meas—the first Memory Encryption and Authentication Scheme providing security against DPA attacks. The scheme combines ideas from fresh re-keying and authentication trees by storing encryption keys in a tree structure to thwart first-order DPA without the need for DPA-protected cryptographic primitives. Therefore, the design strictly limits the use of every key to encrypt at most two different plaintext values. Meas prevents higher-order DPA without changes to the cipher implementation by using masking of the plaintext values. Meas is applicable to all kinds of memory, e.g., NVM and RAM. For RAM, we give two concrete Meas instances based on the lightweight primitives Ascon, PRINCE, and QARMA. We implement and evaluate both instances on a Zynq XC7Z020 FPGA showing that Meas has memory and performance overhead comparable to existing memory authentication techniques without DPA protection.

AB - Memory encryption is used in many devices to protect memory content from attackers with physical access to a device. However, many current memory encryption schemes can be broken using differential power analysis (DPA). In this work, we present Meas—the first Memory Encryption and Authentication Scheme providing security against DPA attacks. The scheme combines ideas from fresh re-keying and authentication trees by storing encryption keys in a tree structure to thwart first-order DPA without the need for DPA-protected cryptographic primitives. Therefore, the design strictly limits the use of every key to encrypt at most two different plaintext values. Meas prevents higher-order DPA without changes to the cipher implementation by using masking of the plaintext values. Meas is applicable to all kinds of memory, e.g., NVM and RAM. For RAM, we give two concrete Meas instances based on the lightweight primitives Ascon, PRINCE, and QARMA. We implement and evaluate both instances on a Zynq XC7Z020 FPGA showing that Meas has memory and performance overhead comparable to existing memory authentication techniques without DPA protection.

KW - side-channel attack

KW - DPA

KW - Memory

KW - Encryption

KW - Authentication

U2 - https://doi.org/10.1007/s13389-018-0180-2

DO - https://doi.org/10.1007/s13389-018-0180-2

M3 - Article

SP - 1

EP - 22

JO - Journal of cryptographic engineering

JF - Journal of cryptographic engineering

SN - 2190-8516

ER -