Diffusional Side-Channel Leakage From Unrolled Lightweight Block Ciphers: A Case Study of Power Analysis on PRINCE
نویسندگان
چکیده
This study investigates a new side-channel leakage observed in the inner rounds of an unrolled hardware implementation block ciphers chosen-input attack scenario. The occurs first round and it can be later because arises from path activation bias caused by difference between two consecutive inputs. Therefore, that exploits is possible even for implementations equipped with countermeasures (masking and/or deglitchers separate circuit terms glitch propagation) involving leakage. We validate existence such unique through set experiments fully PRINCE cipher hardware, implemented on field-programmable gate array (FPGA). In addition, we verify validity evaluate cost countermeasure implementation, namely Threshold Implementation (TI) countermeasure.
منابع مشابه
Side-Channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?
Side-channel attacks represent a powerful category of attacks against cryptographic devices. Still, side-channel analysis for lightweight ciphers is much less investigated than for instance for AES. Although intuition may lead to the conclusion that lightweight ciphers are weaker in terms of side-channel resistance, that remains to be confirmed and quantified. In this paper, we consider various...
متن کاملSide Channel Cube Attacks on Block Ciphers
In this paper we formalize the notion of leakage attacks on iterated block ciphers, in which the attacker can find (via physical probing, power measurement, or any other type of side channel) one bit of information about the intermediate state of the encryption after each round. Since bits computed during the early rounds can be typically represented by low degree multivariate polynomials, cube...
متن کاملa study on construction of iranian life tables: the case study of modified brass logit system
چکیده ندارد.
15 صفحه اولImproved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers
This paper proposes some techniques to improve algebraic fault analysis (AFA). Firstly, we show that building the decryption equation set of a cipher can accelerate the solving procedure. Secondly, we propose a method to represent the injected faults with algebraic equations when the accurate fault location is unknown. We take Piccolo as an example to illustrate our AFA and compare it with prev...
متن کاملesp needs analysis of iranian ma students: a case study of university of isfahan
نیاز سنجی دانشجویان کارشناسی ارشد ایرانی در رابطه با زبان تخصصی: مطالعه ای در دانشگاه اصفهان هدف از این مطالعه بررسی نیازهای یادگیری زبان خارجی دانشجویان کارشناسی ارشد دانشجویان دانشگاه اصفهان در رشته های زیست شناسی، روانشناسی، تربیت بدنی، حسابداری و فلسفه ی غرب میباشد. در مجموع 80 دانشجودر پنج رشته ی متفاوت از دانشگاه اصفهان در این پژوهش شرکت داشتند.علاوه بر این هشتاد دانشجو،25 استاد دروس ت...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2021
ISSN: ['1556-6013', '1556-6021']
DOI: https://doi.org/10.1109/tifs.2020.3033441