Implementation, Benchmarking, and Protection of Lightweight Cryptography Candidates

Date

Authors

Haeussler, Richard

Journal Title

Journal ISSN

Volume Title

Publisher

Abstract

In August 2019, the US National Institute of Standards and Technology (NIST) announced 32 candidates for Round 2 of their Lightweight Cryptography (LWC) standardization process. NIST needed to understand how each of the candidates performed in software and hardware before making their finalist selections. George Mason University's Cryptographic Engineering Research Group (CERG) assisted NIST by organizing the Field- Programmable Gate Array (FPGA) benchmarking of the Round 2 candidates. CERG developed LWC Hardware API compliant implementations for 14 of the Round 2 candidates. This work contains a detailed breakdown of the unprotected hardware implementations of Elephant and Xoodyak, along with figures and tables to illustrate the design choices that were made. It also highlights several new features that CERG added to the LWC Hardware API development package to assist in the FPGA benchmarking. An overview of CERG's benchmarking efforts, along with the results for Elephant and Xoodyak, are contained. From the results, analysis was conducted to determine possible design improvements. On March 29, 2021, NIST announced both Elephant and Xoodyak as LWC finalists. Before NIST announced finalists, Domain Oriented Masking was used to develop side-channel resistant implementations of both Elephant and Xoodyak. The efforts from this work certainly provide NIST with valuable information for their LWC standardization process.

Description

Keywords

Lightweight cryptography, FPGA, DOM, Domain oriented masking, LWC

Citation