A CPA Attack against Round Based Piccolo-80 Hardware Implementation

被引:0
作者
Wang, Chenxu [1 ]
Xie, Xuejun
Yu, Mingyan [1 ]
Wang, Jinxiang [1 ]
Tang, Xiaochen [1 ]
机构
[1] Harbin Inst Technol, Microelect Ctr, Harbin 150006, Peoples R China
来源
2012 5TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP) | 2012年
关键词
Piccolo; lightweight blockcipher; power analysis attack; Correlation Power Analysis (CPA); BLOCK CIPHER;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In CHES 2011, Sony Corporation proposed a very promising ultra-lightweight blockcipher named Piccolo and claimed it offers a sufficient security level against known cryptanalyses based on mathematical weaknesses. The correlation power analysis (CPA) attack against a round-based Piccolo-80 hardware implementation is discussed in this paper. We built a power consumption acquisition platform based on simulation for minimum overhead, presented a feasible CPA attack method based on HD model and the final round, and retrieved the final round key RK24L, RK24R, and the whiten key WK2 and WK2 with 500 power traces. The results showed Piccolo-80 round-based hardware implementation is vulnerable to power analysis attack. To the best of our knowledge, this is the first paper to discuss power analysis attack against Piccolo.
引用
收藏
页码:1740 / 1745
页数:6
相关论文
共 12 条
  • [1] Akkar ML, 2000, LECT NOTES COMPUT SC, V1976, P489
  • [2] [Anonymous], 2012, 2919222012 ISOIEC
  • [3] Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
  • [4] Correlation power analysis with a leakage model
    Brier, E
    Clavier, C
    Olivier, F
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 16 - 29
  • [5] HIGHT: A new block cipher suitable for low-resource device
    Hong, Deukjo
    Sung, Jaechul
    Hong, Seokhie
    Lim, Jongin
    Lee, Sangjin
    Koo, Bon-Seok
    Lee, Changhoon
    Chang, Donghoon
    Lee, Jesang
    Jeong, Kitae
    Kim, Hyun
    Kim, Jongsung
    Chee, Seongtaek
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 46 - 59
  • [6] Correlation power analysis of Trivium
    Jia, Yanyan
    Hu, Yupu
    Wang, Fenghe
    Wang, Hongxian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 479 - 484
  • [7] Knudsen L, 2010, LECT NOTES COMPUT SC, V6225, P16, DOI 10.1007/978-3-642-15031-9_2
  • [8] Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
  • [9] Kocher P. C., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P104
  • [10] Liu JY, 2011, LECT NOTES COMPUT SC, V6672, P196, DOI 10.1007/978-3-642-21031-0_15