Abstract
The Mobile Big Data Computing is a new evolution of computing technology in data communication and processing. The data generated from mobile devices can be used for optimization and personalization of mobile services and other profitable businesses. Mobile devices are usually with limited computing resources, thus the security measures are constrained. To solve this problem, lightweight block ciphers are usually adopted. However, due to the easily exposed environment, lightweight block ciphers are apt to suffer from differential power attack. To counteract this attack, Nikova et al. proposed a provably secure method, namely sharing, to protect the cipher’s implementation. But the complexity of sharing method is so high, making this method not practical. To address this issue, in this paper, we propose a GPU-based approach of sharing a 4-bit S-box by automatic search. GPU is a promising acceleration hardware with powerful parallel computing. By analyzing the sharing method carefully, we devise an optimal approach, namely OptImp, that improves the performance massively. The experiment results show that the proposed approach can achieve up to 300 times faster than the original method. With our approach, the sharing method can be used to protect lightweight block ciphers in practice.
Similar content being viewed by others
References
Akkar M, Giraud C (2001) An implementation of DES and aes, secure against some attacks. In: Cryptographic hardware and embedded systems - CHES 2001. Springer, Generators, Paris, pp 309–318
Alemneh E (2010) Share nonlinear gates in the presence of glitches. In: Master thesis of the University of Twente. Netherlands
Blömer J, Guajardo J, Krummel V (2004) Provably secure masking of AES. In: Selected areas in cryptography - SAC 2004, pp 69–83
Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJB, Seurin Y, Vikkelsoe C (2007) PRESENT: an ultra-lightweight block cipher. In: Cryptographic hardware and embedded systems - CHES 2007, pp 450–466
Buja AG, Latip SFA (2015) The direction of lightweight ciphers in mobile big data computing. Procedia Comput Sci 72 :469–476
Fan Z, Qiu F, Kaufman AE, Yoakum-Stover S (2004) GPU cluster for high performance computing. In: Proceedings of the ACM/IEEE SC2004 conference on high performance networking and computing, p 47
Gong Z, Nikova S, Law YW (2011) KLEIN: A new family of lightweight block ciphers. In: RFID. Security and privacy - RFIDSec 2011. Springer, Amherst, pp 1–18
Ishai Y, Sahai A, Wagner D (2003) Private circuits: securing hardware against probing attacks. In: CRYPTO 2003. Springer, Santa Barbara, pp 463–481
Jiang H, Fujishiro M, Kodera H, Yanagisawa M, Togawa N (2015) Scan-based side-channel attack on the camellia block cipher using scan signatures. IEICE Trans 98-A(12):2547–2555
Kocher PC, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology - CRYPTO ’99, pp 388–397
Liu B, Gong Z, Qiu W (2016) Automatic search of threshold implementations of 4-bit s-boxes resisting dpa. will be published in Chinese Journal of Electronics
Mangard S, Popp T, Gammel BM (2005a) Side-channel leakage of masked CMOS gates. In: CT-RSA 2005. Springer, San Francisco, pp 351–365
Mangard S, Pramstaller N, Oswald E (2005b) Successfully attacking masked AES hardware implementations. In: Cryptographic hardware and embedded systems - CHES 2005. Springer, Edinburgh, pp 157–171
Moon S, Yoon C (2015) Information retrieval system using the keyword concept net of the P2P service-based in the mobile cloud environment. Peer-to-Peer Netw Appl 8(4):596–609
Nikova S, Rijmen V, Schläffer M (2011) Secure hardware implementation of nonlinear functions in the presence of glitches. J Cryptol 24(2):292–321
Popp T, Mangard S (2005) Masked dual-rail pre-charge logic: Dpa-resistance without routing constraints. In: Cryptographic hardware and embedded systems - CHES 2005. Springer, pp 172–186
Poschmann A, Moradi A, Khoo K, Lim C, Wang H, Ling S (2011) Side-channel resistant crypto for less than 2, 300 GE. J Cryptol 24(2):322–345
Prouff E (2005) DPA attacks and s-boxes. In: Fast software encryption - FSE 2005, pp 424–441
Rabaey JM (1996) Digital integrated circuits: a design perspective. Prentice-Hall Inc., Upper Saddle River
Shanmugam D, Selvam R, Annadurai S (2014) Differential power analysis attack on SIMON and LED block ciphers. In: Security, privacy, and applied cryptography engineering - SPACE 2014, pp 110–125
Shibutani K, Isobe T, Hiwatari H, Mitsuda A, Akishita T, Shirai T (2011) Piccolo: an ultra-lightweight blockcipher. In: Cryptographic hardware and embedded systems - CHES 2011, pp 342– 357
Smart NP (2000) Physical side-channel attacks on cryptographic systems. Softw Focus 1(2):6–13
Waluyo AB, Srinivasan B, Taniar D (2005) Research in mobile database query optimization and processing. Mob Inf Syst 1(4):225–252
Waluyo AB, Taniar D, Srinivasan B (2013) The convergence of big data and mobile computing. In: International conference on network-based information systems - NBiS 2013, pp 79– 84
Xu J, Lee W, Tang X, Gao Q, Li S (2006) An error-resilient and tunable distributed indexing scheme for wireless data broadcast. IEEE Trans Knowl Data Eng 18(2):392–404
Acknowledgments
This work is sponsored by program of Shanghai Technology Research Leader under Grant No. 16XD1424400, program of Key Technologies Research and Development under Grant No. 2014BAK06B02, and program for New Century Excellent Talents in University under Grant No. NCET-12-0358.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Qiu, W., Liu, B., Ge, C. et al. Protecting lightweight block cipher implementation in mobile big data computing. Peer-to-Peer Netw. Appl. 11, 252–264 (2018). https://doi.org/10.1007/s12083-016-0481-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-016-0481-0