A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study
نویسندگان
چکیده مقاله:
In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON features. Our new method includes only AND equivalent and XOR equivalent operations since every cryptographic algorithm can be implemented with two basic operations, namely AND and XOR. Therefore, hamming weight and hamming distance take constant values at each moment of time. This can decrease data-dependency between processed values and consumed power. In order to practically evaluate the resulting implementation overheads and the resistance improvement against CPA, we implement the proposed coding scheme on SIMON, a lightweight block cipher, on a smart card with the ATmega163 microprocessor. We define resistance as the number of traces, which for less than that number; the correct key cannot be distinguished from all other hypothetical keys by its correlation coefficient in any moment of time. The results of this implementation show 350 times more immunity against correlation attacks.
منابع مشابه
Software Implementation and Experimentation with a New Genetic Algorithm for Layout Design
This paper discusses the development of a new GA for layout design. The GA was already designed and reported. However the implementation used in the earlier work was rudimentary and cumbersome, having no suitable Graphical User Interface, GUI. This paper discusses the intricacies of the algorithm and the GA operators used in previous work. It also reports on implementation of a new GA operator ...
متن کاملIPcore implementation susceptibility: A case study of Low latency ciphers
Security evaluation of third-party cryptographic IP (Intellectual Property) cores is often ignored due to several reasons including, lack of awareness about its adversity, lack of trust validation methodology otherwise view security as a byproduct. Particularly, the validation of low latency cipher IP core on Internet of Things (IoT) devices is crucial as they may otherwise become vulnerable fo...
متن کاملSIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs
While AES is extensively in use in a number of applications, its area cost limits its deployment in resource constrained platforms. In this paper, we have implemented SIMON, a recent promising low-cost alternative of AES on reconfigurable platforms. The Feistel network, the construction of the round function and the key generation of SIMON, enables bit-serial hardware architectures which can si...
متن کاملSoftware Implementation And Evaluation Of Lightweight Symmetric Block Ciphers Of The Energy Perspectives And Memory
Lightweight ciphers are the form of encryption that strictly limited to devices such as tags, RFID, wireless sensor networks applications. Low-resource devices has many limitations in power, energy and memory. In this work, the lightweight block ciphers is implemented on the Atmega128 microprocessor and the results of the energy perspectives and memory were assessed. The results of the evaluati...
متن کاملProposing a new model for assessing the resilience of susceptible infrastructure (case study: hydroelectric power plant)
Background and objective: Given the high share of energy production by hydropower plants in Iran and the weaknesses of the resilience and protection model in this area, the importance of providing a model based on concepts such as؛ Expresses dependencies, correlations, risk management and analysis. In this paper, a new method for measuring the resilience of an energy infrastructure is presented...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ذخیره در منابع من قبلا به منابع من ذحیره شده{@ msg_add @}
عنوان ژورنال
دوره 9 شماره 2
صفحات 21- 32
تاریخ انتشار 2017-07-31
با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.
کلمات کلیدی
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023