Peer-to-Peer Netw. Appl. DOI 10.1007/s12083-016-0481-0 Protecting lightweight block cipher implementation in mobile big data computing A GPU-based approach Weidong Qiu 1 · Bozhong Liu 1 · Can Ge 1 · Lingzhi Xu 1 · Xiaoming Tang 1 · Guozhen Liu 1 Received: 13 April 2016 / Accepted: 8 July 2016 © Springer Science+Business Media New York 2016 Abstract The Mobile Big Data Computing is a new evo- lution of computing technology in data communication and processing. The data generated from mobile devices can be used for optimization and personalization of mobile services and other profitable businesses. Mobile devices are usually with limited computing resources, thus the security mea- sures are constrained. To solve this problem, lightweight block ciphers are usually adopted. However, due to the eas- ily exposed environment, lightweight block ciphers are apt to suffer from differential power attack. To counteract this attack, Nikova et al. proposed a provably secure method, namely sharing, to protect the cipher’s implementation. But the complexity of sharing method is so high, making this method not practical. To address this issue, in this paper, we propose a GPU-based approach of sharing a 4-bit S-box by automatic search. GPU is a promising acceleration hard- ware with powerful parallel computing. By analyzing the sharing method carefully, we devise an optimal approach, namely OptImp, that improves the performance massively. The experiment results show that the proposed approach can achieve up to 300 times faster than the original method. With our approach, the sharing method can be used to protect lightweight block ciphers in practice. Keywords Mobile big data · Lightweight block cipher · Threshold implementation · GPU optimization Weidong Qiu qiuwd@sjtu.edu.cn Bozhong Liu liu.bo.zhong@gmail.com 1 School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China 1 Introduction The arrival of Big Data era, the proliferation of wireless technology and the development of mobile technology have led to the Mobile Big Data Computing, a new evolution of computing technology in data communication and process- ing [24]. Mobile computing enables users to access various types of services anywhere and anytime using lightweight mobile devices (e.g., tablets, smart phones) [23, 25]. Mobile is particularly well-suited to a big data scenario, because even when we are ostensibly not using our phones, a large quantity of data are still being created, such as the feeds, the Push notifications and other App services. These data can be used for the optimization and personalization of mobile ser- vices, the real-time hyper-local advertising, as well as other profitable businesses [14]. Mobile devices are usually with limited computing resources. As the advance of mobile technology, the new generation devices are getting smaller with limited envi- ronment and power consumption. Because the implementa- tion of the security is bounded to the available computing resources, the small devices are not able to offer comprehen- sive and robust security measures. As a result, lightweight block cipher is usually used to protect users’ sensitive infor- mation in mobile big data [5]. It is a set of well-designed cryptographic algorithms that are suitable for the limited environment and low-cost products [4]. However, due to the limited and easily exposed environ- ment, lightweight block ciphers on the mobile devices are apt to suffer from side-channel attack [9, 22], especially dif- ferential power analysis (DPA) attack [10]. DPA aims to access the secret key by analyzing the leaked information from the intermediate result. It has been shown to be a powerful tool to break many lightweight block ciphers [18, 20]. In order to counteract DPA attacks, several different