Optimization of a Keccak Hardware Accelerator Protected against Side-Channel Attacks H/F

  • Cyber security : hardware and sofware,
  • Internship
  • CEA-List
  • Grenoble
  • Level 7
  • 1900-01-01
Apply

The objective of this internship is to optimize a first-order masked Keccak accelerator implementing Domain Oriented Masking (DOM) for protection against side-channel attacks. The work focuses on reducing both the hardware area and the amount of randomness required by the countermeasure, without compromising security. Starting from the existing masked SHA-3 accelerator developed at CEA [1], the student will analyze the main sources of area overhead introduced by the masking and randomness generation mechanisms. Based on this analysis, alternative micro-architectural solutions for the non-linear Keccak steps and the randomness dispatcher will be investigated to improve efficiency. The optimized design will be modeled in HDL and synthesized on FPGA or ASIC targets to evaluate cost, performance, and scalability. Security validation will be conducted using Test Vector Leakage Assessment (TVLA). The expected outcome is a more compact and resource-efficient masked Keccak accelerator that maintains first-order resistance, enabling practical deployment of secure SHA-3 hardware in post-quantum cryptographic systems.

This offer is dedicated to master students looking for an ambitious research-oriented internship. If you are looking for an experience in ASIC and FPGA design with industrial-grade tools and processes, this internship is perfect for you! It is required to have graduate-level experience in FPGA and ASIC design and be familiar with arithmetic circuit microarchitectures, RTL modelling (VHDL or Verilog/SystemVerilog) and synthesis (Synopsys Design Compiler, Xilinx Vivado).

en_USEN

Contact us

We will reply as soon as possible...