会议专题

Differential Power Cryptanalysis Attacks against PRESENT Implementation

PRESENT, proposed by A. Bogdanov et al. in CHES 2007, is an ultra-lightweight symmetric cipher for extremely constrained environments such as RFID tags and sensor net-works. In this article, a representative platform, 0.25 μm 1.8 V standard cell circuit is proposed to complement the PRESENT, the simulation-based ASIC experimental environment is built to acquire power data. According to the fact that the power consumption of a digital circuit implemented in the CMOS technology depends on the data that the circuit is processing, we create the hypothetical circuit model for differential power analysis (DPA) against the special block cipher, PRESENT. Two Different statistical methods, multi-bit DPA and correla-tion power analysis (CPA), are conducted in this paper to ana-lyze the power data sampled from the power traces. We can attack all secret key bits after first two rounds DPA attack. Our results present the vulnerability to power analysis attack against the hardware implementations of PRESENT.

Security Lightweight Block Cipher PRESENT implementation Differential Power Analysis(DPA) Correlation Power Analysis(CPA) Power Model

Jing Zhang Dawu Gu Zheng Guo Lei Zhang

Department of Computer Science and Engineering,Shanghai Jiao Tong University, Shanghai 200240, P.R. School of Microelectronics,Shanghai Jiao Tong University, Shanghai 200240, P.R. China Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, P.R.

国际会议

2010 3rd International Conference on Advanced Computer Theory and Engineering(2010年第三届先进计算机理论与工程国际会议 ICACTE 2010)

成都

英文

1-5

2010-08-20(万方平台首次上网日期,不代表论文的发表时间)