Differential Power Analysis Attack and Efficient Countermeasures on PRESENT

被引:0
作者
Duan, Xiaoyi [1 ]
Cui, Qi [1 ]
Wang, Sixiang [1 ]
Fang, Huawei [1 ]
She, Gaojian [1 ]
机构
[1] Beijing Elect Sci & Technol Inst, Elect & Informat Engn Dept, Fufeng Rd 7, Beijing, Peoples R China
来源
PROCEEDINGS OF 2016 8TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2016) | 2016年
关键词
lightweight block cipher; PRESENT; differential power analysis; countermeasure; masking method;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
PRESENT is an ultra-lightweight symmetric cryptographic algorithm designed to adapt to the resource constrained computing scenarios, and it was put forward in 2007. With the continuous development of Internet of things (IoT), the application of this kind algorithm becomes increasingly popular, so the implementation security of the algorithm has correspondingly become an imperative research area. Based on the theory of side channel attack, this paper has investigated the Differential Power Analysis (DPA) technique, and taking the PRESENT algorithm as the target, it verified the feasibility of breaking the PRESENT algorithm. The test results indication that the PRESENT algorithm is vulnerable to power consumption attack under the current hardware environment. Also, to resist these attacks, this paper proposes a fixed-value mask algorithm for PRESENT.
引用
收藏
页码:8 / 12
页数:5
相关论文
共 13 条
  • [1] Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
  • [2] Gebotys C. H., 2006, ACM T EMBED COMPUT S, V5, P577
  • [3] Itoh Kouichi, 2009, IFIP INT FEDERATION, P99
  • [4] JIN Chen hui, 2010, COMPUTER ENG
  • [5] Kocher Paul, 2008, LECT NOTES COMPUTER, P388
  • [6] Le TH, 2006, LECT NOTES COMPUT SC, V4249, P174
  • [7] Meritt K., 2012, ENCY BIOMETRICS, V8, P30
  • [8] Natale Giorgio Di, 2008, LATW08 IEEE LAT AM T
  • [9] Pospísil J, 2012, IEEE INT SYMP DESIGN, P197, DOI 10.1109/DDECS.2012.6219055
  • [10] Wang CX, 2012, INT CONF CLOUD COMPU, P1248, DOI 10.1109/CCIS.2012.6664584