A General Degenerate Grouping Power Attack with Specific Application to SIMON and SPECK

نویسنده

  • Steven Cavanaugh
چکیده

A Degenerate Grouping Power Attack (DGPA) is a type of Partitioning Power Analysis (PPA) used to extract secret keys from the power sidechannel signal of an encryption algorithm running on a device along with some known and varying information such as the associated plaintext or ciphertext associated with each encryption. The DGPA is applied to SIMON and SPECK implementations on MSP430, PIC16F, and Spartan 6 platforms in this work. While keys are successfully recovered from unprotected implementations, guidance is given on a minimum number of rounds, d, to perform per clock cycle in FPGAs and ASICs as to mitigate against such attacks for a deployment dependent maximum quantity of data which is to be encrypted with a given key. On the Spartan 6, full key recovery of SIMON 64/128 d ≤ 4 and SPECK 64/128 d ≤ 3 is trivially achieved in seconds with no more than one million random plaintexts, requiring the use of larger d for most implementations. The amount of work to recover a key as a function of the amount of collected data encrypted with that key is explored. To ensure security when performing most modes of block cipher operation with an algorithm having block size 2n, a particular key should be used to perform no more than 2 encryptions. A feasible key recovery requiring less than 80-bits of work and data from less than 2 encryptions is excluded for SIMON 64/128 implementations having d ≥ 9 and for SPECK 64/128 implementations having d ≥ 5. The DGPA attack method is demonstrated to succeed against a limited data set consisting of one power sample per device clock cycle against a specifically targeted instruction. This provides a basis for a low power field deployed power side channel signal capture hardware for embedded key recovery and exfiltration.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study

In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON features. Our new method includes only AND equivalent and XOR equivalent operations since every ...

متن کامل

The Simeck Family of Lightweight Block Ciphers

Two lightweight block cipher families, Simon and Speck, have been proposed by researchers from the NSA recently. In this paper, we introduce Simeck, a new family of lightweight block ciphers that combines the good design components from both Simon and Speck, in order to devise even more compact and e cient block ciphers. For Simeck32/64, we can achieve 505 GEs (before the Place and Route phase)...

متن کامل

A Computational Study about the Effect of Turbines Pitched Blade Attack Angle on the Power Consumption of a Stirred Tank

In this study, the stirring mechanism of shear-thinning fluids benefiting from four blades in turbulent flow is considered. The fluid is studied inside a stirred cylindrical tank with a flat bottom. The height of fluid is equal to the cylinder’s diameter and the impeller is positioned centrally. A CFD simulation has been carried out and three-dimensional turbulent flow is numerically analyzed u...

متن کامل

Implementation and Performance of the Simon and Speck Lightweight Block Ciphers on ASICs

Simon and Speck are families of lightweight block ciphers proposed in June 2013 by the US National Security Agency. Here we discuss ASIC implementations of these algorithms, presenting in some detail how one implements the smallest bit-serial versions of the algorithms. We also give area and throughput results for a variety of implementations—bit serial, iterated, and partially and fully pipeli...

متن کامل

Isolation of the Gene Coding for Movement Protein from Grapevine Fanleaf Virus

A pair of degenerate primers, GMPF1 and GMPR1, was designed on the basis of alignment of previously reported Grapevine fanleaf virus (GFLV) movement protein (MP) nucleotide sequences from Iran and other parts of the world. cDNA was synthesized by the use of Oligo d(T)18 from total RNA extraction from each diseased grapevine leaf sample and subjected to polymerase chain reaction (PCR) with the d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2017  شماره 

صفحات  -

تاریخ انتشار 2017