A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study

Authors

Abstract:

In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON features. Our new method includes only AND equivalent and XOR equivalent operations since every cryptographic algorithm can be implemented with two basic operations, namely AND and XOR. Therefore, hamming weight and hamming distance take constant values at each moment of time. This can decrease data-dependency between processed values and consumed power. In order to practically evaluate the resulting implementation overheads and the resistance improvement against CPA, we implement the proposed coding scheme on SIMON, a lightweight block cipher, on a smart card with the ATmega163 microprocessor. We define resistance as the number of traces, which for less than that number; the correct key cannot be distinguished from all other hypothetical keys by its correlation coefficient in any moment of time. The results of this implementation show 350 times more immunity against correlation attacks.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Software Implementation and Experimentation with a New Genetic Algorithm for Layout Design

This paper discusses the development of a new GA for layout design. The GA was already designed and reported. However the implementation used in the earlier work was rudimentary and cumbersome, having no suitable Graphical User Interface, GUI. This paper discusses the intricacies of the algorithm and the GA operators used in previous work. It also reports on implementation of a new GA operator ...

full text

IPcore implementation susceptibility: A case study of Low latency ciphers

Security evaluation of third-party cryptographic IP (Intellectual Property) cores is often ignored due to several reasons including, lack of awareness about its adversity, lack of trust validation methodology otherwise view security as a byproduct. Particularly, the validation of low latency cipher IP core on Internet of Things (IoT) devices is crucial as they may otherwise become vulnerable fo...

full text

SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs

While AES is extensively in use in a number of applications, its area cost limits its deployment in resource constrained platforms. In this paper, we have implemented SIMON, a recent promising low-cost alternative of AES on reconfigurable platforms. The Feistel network, the construction of the round function and the key generation of SIMON, enables bit-serial hardware architectures which can si...

full text

Software Implementation And Evaluation Of Lightweight Symmetric Block Ciphers Of The Energy Perspectives And Memory

Lightweight ciphers are the form of encryption that strictly limited to devices such as tags, RFID, wireless sensor networks applications. Low-resource devices has many limitations in power, energy and memory. In this work, the lightweight block ciphers is implemented on the Atmega128 microprocessor and the results of the energy perspectives and memory were assessed. The results of the evaluati...

full text

Proposing a new model for assessing the resilience of susceptible infrastructure (case study: hydroelectric power plant)

Background and objective: Given the high share of energy production by hydropower plants in Iran and the weaknesses of the resilience and protection model in this area, the importance of providing a model based on concepts such as؛ Expresses dependencies, correlations, risk management and analysis. In this paper, a new method for measuring the resilience of an energy infrastructure is presented...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 9  issue 2

pages  21- 32

publication date 2017-07-31

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023