Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 2/2018

25.07.2016

Protecting lightweight block cipher implementation in mobile big data computing

A GPU-based approach

verfasst von: Weidong Qiu, Bozhong Liu, Can Ge, Lingzhi Xu, Xiaoming Tang, Guozhen Liu

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 2/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Mobile Big Data Computing is a new evolution of computing technology in data communication and processing. The data generated from mobile devices can be used for optimization and personalization of mobile services and other profitable businesses. Mobile devices are usually with limited computing resources, thus the security measures are constrained. To solve this problem, lightweight block ciphers are usually adopted. However, due to the easily exposed environment, lightweight block ciphers are apt to suffer from differential power attack. To counteract this attack, Nikova et al. proposed a provably secure method, namely sharing, to protect the cipher’s implementation. But the complexity of sharing method is so high, making this method not practical. To address this issue, in this paper, we propose a GPU-based approach of sharing a 4-bit S-box by automatic search. GPU is a promising acceleration hardware with powerful parallel computing. By analyzing the sharing method carefully, we devise an optimal approach, namely OptImp, that improves the performance massively. The experiment results show that the proposed approach can achieve up to 300 times faster than the original method. With our approach, the sharing method can be used to protect lightweight block ciphers in practice.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akkar M, Giraud C (2001) An implementation of DES and aes, secure against some attacks. In: Cryptographic hardware and embedded systems - CHES 2001. Springer, Generators, Paris, pp 309–318 Akkar M, Giraud C (2001) An implementation of DES and aes, secure against some attacks. In: Cryptographic hardware and embedded systems - CHES 2001. Springer, Generators, Paris, pp 309–318
2.
Zurück zum Zitat Alemneh E (2010) Share nonlinear gates in the presence of glitches. In: Master thesis of the University of Twente. Netherlands Alemneh E (2010) Share nonlinear gates in the presence of glitches. In: Master thesis of the University of Twente. Netherlands
3.
Zurück zum Zitat Blömer J, Guajardo J, Krummel V (2004) Provably secure masking of AES. In: Selected areas in cryptography - SAC 2004, pp 69–83 Blömer J, Guajardo J, Krummel V (2004) Provably secure masking of AES. In: Selected areas in cryptography - SAC 2004, pp 69–83
4.
Zurück zum Zitat Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJB, Seurin Y, Vikkelsoe C (2007) PRESENT: an ultra-lightweight block cipher. In: Cryptographic hardware and embedded systems - CHES 2007, pp 450–466 Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJB, Seurin Y, Vikkelsoe C (2007) PRESENT: an ultra-lightweight block cipher. In: Cryptographic hardware and embedded systems - CHES 2007, pp 450–466
5.
Zurück zum Zitat Buja AG, Latip SFA (2015) The direction of lightweight ciphers in mobile big data computing. Procedia Comput Sci 72 :469–476CrossRef Buja AG, Latip SFA (2015) The direction of lightweight ciphers in mobile big data computing. Procedia Comput Sci 72 :469–476CrossRef
6.
Zurück zum Zitat Fan Z, Qiu F, Kaufman AE, Yoakum-Stover S (2004) GPU cluster for high performance computing. In: Proceedings of the ACM/IEEE SC2004 conference on high performance networking and computing, p 47 Fan Z, Qiu F, Kaufman AE, Yoakum-Stover S (2004) GPU cluster for high performance computing. In: Proceedings of the ACM/IEEE SC2004 conference on high performance networking and computing, p 47
7.
Zurück zum Zitat Gong Z, Nikova S, Law YW (2011) KLEIN: A new family of lightweight block ciphers. In: RFID. Security and privacy - RFIDSec 2011. Springer, Amherst, pp 1–18 Gong Z, Nikova S, Law YW (2011) KLEIN: A new family of lightweight block ciphers. In: RFID. Security and privacy - RFIDSec 2011. Springer, Amherst, pp 1–18
8.
Zurück zum Zitat Ishai Y, Sahai A, Wagner D (2003) Private circuits: securing hardware against probing attacks. In: CRYPTO 2003. Springer, Santa Barbara, pp 463–481 Ishai Y, Sahai A, Wagner D (2003) Private circuits: securing hardware against probing attacks. In: CRYPTO 2003. Springer, Santa Barbara, pp 463–481
9.
Zurück zum Zitat Jiang H, Fujishiro M, Kodera H, Yanagisawa M, Togawa N (2015) Scan-based side-channel attack on the camellia block cipher using scan signatures. IEICE Trans 98-A(12):2547–2555CrossRef Jiang H, Fujishiro M, Kodera H, Yanagisawa M, Togawa N (2015) Scan-based side-channel attack on the camellia block cipher using scan signatures. IEICE Trans 98-A(12):2547–2555CrossRef
10.
Zurück zum Zitat Kocher PC, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology - CRYPTO ’99, pp 388–397 Kocher PC, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology - CRYPTO ’99, pp 388–397
11.
Zurück zum Zitat Liu B, Gong Z, Qiu W (2016) Automatic search of threshold implementations of 4-bit s-boxes resisting dpa. will be published in Chinese Journal of Electronics Liu B, Gong Z, Qiu W (2016) Automatic search of threshold implementations of 4-bit s-boxes resisting dpa. will be published in Chinese Journal of Electronics
12.
Zurück zum Zitat Mangard S, Popp T, Gammel BM (2005a) Side-channel leakage of masked CMOS gates. In: CT-RSA 2005. Springer, San Francisco, pp 351–365 Mangard S, Popp T, Gammel BM (2005a) Side-channel leakage of masked CMOS gates. In: CT-RSA 2005. Springer, San Francisco, pp 351–365
13.
Zurück zum Zitat Mangard S, Pramstaller N, Oswald E (2005b) Successfully attacking masked AES hardware implementations. In: Cryptographic hardware and embedded systems - CHES 2005. Springer, Edinburgh, pp 157–171 Mangard S, Pramstaller N, Oswald E (2005b) Successfully attacking masked AES hardware implementations. In: Cryptographic hardware and embedded systems - CHES 2005. Springer, Edinburgh, pp 157–171
14.
Zurück zum Zitat Moon S, Yoon C (2015) Information retrieval system using the keyword concept net of the P2P service-based in the mobile cloud environment. Peer-to-Peer Netw Appl 8(4):596–609CrossRef Moon S, Yoon C (2015) Information retrieval system using the keyword concept net of the P2P service-based in the mobile cloud environment. Peer-to-Peer Netw Appl 8(4):596–609CrossRef
15.
Zurück zum Zitat Nikova S, Rijmen V, Schläffer M (2011) Secure hardware implementation of nonlinear functions in the presence of glitches. J Cryptol 24(2):292–321MathSciNetCrossRefMATH Nikova S, Rijmen V, Schläffer M (2011) Secure hardware implementation of nonlinear functions in the presence of glitches. J Cryptol 24(2):292–321MathSciNetCrossRefMATH
16.
Zurück zum Zitat Popp T, Mangard S (2005) Masked dual-rail pre-charge logic: Dpa-resistance without routing constraints. In: Cryptographic hardware and embedded systems - CHES 2005. Springer, pp 172–186 Popp T, Mangard S (2005) Masked dual-rail pre-charge logic: Dpa-resistance without routing constraints. In: Cryptographic hardware and embedded systems - CHES 2005. Springer, pp 172–186
17.
Zurück zum Zitat Poschmann A, Moradi A, Khoo K, Lim C, Wang H, Ling S (2011) Side-channel resistant crypto for less than 2, 300 GE. J Cryptol 24(2):322–345MathSciNetCrossRefMATH Poschmann A, Moradi A, Khoo K, Lim C, Wang H, Ling S (2011) Side-channel resistant crypto for less than 2, 300 GE. J Cryptol 24(2):322–345MathSciNetCrossRefMATH
18.
Zurück zum Zitat Prouff E (2005) DPA attacks and s-boxes. In: Fast software encryption - FSE 2005, pp 424–441 Prouff E (2005) DPA attacks and s-boxes. In: Fast software encryption - FSE 2005, pp 424–441
19.
Zurück zum Zitat Rabaey JM (1996) Digital integrated circuits: a design perspective. Prentice-Hall Inc., Upper Saddle River Rabaey JM (1996) Digital integrated circuits: a design perspective. Prentice-Hall Inc., Upper Saddle River
20.
Zurück zum Zitat Shanmugam D, Selvam R, Annadurai S (2014) Differential power analysis attack on SIMON and LED block ciphers. In: Security, privacy, and applied cryptography engineering - SPACE 2014, pp 110–125 Shanmugam D, Selvam R, Annadurai S (2014) Differential power analysis attack on SIMON and LED block ciphers. In: Security, privacy, and applied cryptography engineering - SPACE 2014, pp 110–125
21.
Zurück zum Zitat Shibutani K, Isobe T, Hiwatari H, Mitsuda A, Akishita T, Shirai T (2011) Piccolo: an ultra-lightweight blockcipher. In: Cryptographic hardware and embedded systems - CHES 2011, pp 342– 357 Shibutani K, Isobe T, Hiwatari H, Mitsuda A, Akishita T, Shirai T (2011) Piccolo: an ultra-lightweight blockcipher. In: Cryptographic hardware and embedded systems - CHES 2011, pp 342– 357
22.
Zurück zum Zitat Smart NP (2000) Physical side-channel attacks on cryptographic systems. Softw Focus 1(2):6–13CrossRef Smart NP (2000) Physical side-channel attacks on cryptographic systems. Softw Focus 1(2):6–13CrossRef
23.
Zurück zum Zitat Waluyo AB, Srinivasan B, Taniar D (2005) Research in mobile database query optimization and processing. Mob Inf Syst 1(4):225–252 Waluyo AB, Srinivasan B, Taniar D (2005) Research in mobile database query optimization and processing. Mob Inf Syst 1(4):225–252
24.
Zurück zum Zitat Waluyo AB, Taniar D, Srinivasan B (2013) The convergence of big data and mobile computing. In: International conference on network-based information systems - NBiS 2013, pp 79– 84 Waluyo AB, Taniar D, Srinivasan B (2013) The convergence of big data and mobile computing. In: International conference on network-based information systems - NBiS 2013, pp 79– 84
25.
Zurück zum Zitat Xu J, Lee W, Tang X, Gao Q, Li S (2006) An error-resilient and tunable distributed indexing scheme for wireless data broadcast. IEEE Trans Knowl Data Eng 18(2):392–404 Xu J, Lee W, Tang X, Gao Q, Li S (2006) An error-resilient and tunable distributed indexing scheme for wireless data broadcast. IEEE Trans Knowl Data Eng 18(2):392–404
Metadaten
Titel
Protecting lightweight block cipher implementation in mobile big data computing
A GPU-based approach
verfasst von
Weidong Qiu
Bozhong Liu
Can Ge
Lingzhi Xu
Xiaoming Tang
Guozhen Liu
Publikationsdatum
25.07.2016
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 2/2018
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-016-0481-0

Weitere Artikel der Ausgabe 2/2018

Peer-to-Peer Networking and Applications 2/2018 Zur Ausgabe