Charge Based Power Side-Channel Attack Methodology for an Adiabatic Cipher
نویسندگان
چکیده
SIMON is a block cipher developed to provide flexible security options for lightweight hardware applications such as the Internet-of-things (IoT). Safeguarding resource-constrained from side-channel attacks poses significant challenge. Adiabatic circuit operation has recently received attention due ultra-low power consumption. In this work, charge-based methodology mount correlation analysis (CPA) based attack an adiabatic core. The method significantly reduces complexity by reducing required number of samples two orders magnitude. CPA results demonstrate that measurements-to-disclosure (MTD) retrieve secret key core 4× higher compared conventional static CMOS implementation. effect increase in target signal load capacitance on MTD also investigated. It observed can be reduced half if driven increased 2× SIMON, and 5× SIMON. This sensitivity pose serious concern facilitating more efficient attack.
منابع مشابه
Power Analysis Based Side Channel Attack
Side channel attacks break the secret key of a cryptosystem using channels such as sound, heat, time and power consumption which are originally not intended to leak such information. Power analysis is a branch of side channel attacks where power consumption data is used as the side channel to attack the system. First using a device like an oscilloscope power traces are collected when the crypto...
متن کاملImproved side channel attack on the block cipher NOEKEON
NOEKEON is a block cipher having key-size 128 and block size 128,proposed by Daemen, J et al.Shekh Faisal Abdul-Latip et al. give a side channel attack(under the single bit leakage model) on the cipher at ISPEC 2010.Their analysis shows that one can recover the 128-bit key of the cipher, by considering a one-bit information leakage from the internal state after the second round, with time compl...
متن کاملSide channel attack: an approach based on machine learning
In cryptography, a side channel attack is any attack based on the analysis of measurements related to the physical implementation of a cryptosystem. Nowadays, the possibility of collecting a large amount of observations paves the way to the adoption of machine learning techniques, i.e. techniques able to extract information and patterns from large datasets. The use of statistical techniques for...
متن کاملPower-Based Side-Channel Attack for AES Key Extraction on the ATMega328 Microcontroller
We demonstrate the extraction of an AES secret key from flash memory on the ATMega328 microcontroller (the microcontroller used on the popular Arduino Genuino/Uno board). We loaded a standard AVR-architecture AES-128 implementation onto the chip and encrypted randomly chosen plaintexts with several different keys. We measured the chip’s power consumption during encryption, correlated observed p...
متن کاملA Statistics-based Fundamental Model for Side-channel Attack Analysis
Side-channel attacks (SCAs) exploit leakage from the physical implementation of cryptographic algorithms to recover the otherwise secret information. In the last decade, popular SCAs like differential power analysis (DPA) and correlation power analysis (CPA) have been invented and demonstrated to be realistic threats to many critical embedded systems. However, there is still no sound and provab...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2021
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics10121438