会议专题

A MORE PRACTICAL CPA ATTACK AGAINST PRESENT HARDWARE IMPLEMENTATION

  In CHES 2007,Bogdanov et al.proposed an ultra-lightweight block cipher named PRESENT,which has been included in the new international standard ISO/IEC 29192-2:2012.The correlation power analysis (CPA) attack against PRESENT is discussed in this paper.The first power analysis attack against the hardware implementation of PRESENT has been proposed by Zhang et al.in 2010.In this paper,we proposed a more practical attack method which does not need to reset the attacked device before each measurement.In order to test our method,we built a power consumption acquisition platform based on simulation and used two attack models to reveal the secret key via CPA.These two models need at least 450 and 230 plaintexts to successfully disclose the first round key,respectively.The results showed PRESENT ciphers vulnerability to power analysis attack.

PRESENT Lightweight blockcipher Power analysis attack Correlation power analysis (CPA)

Chenxu Wang Mingyan Yu Jinxiang Wang Peihe Jiang Xiaochen Tang

Microelectronics Center,Harbin Institute of Technology at Weihai,Weihai 264209,China;Microelectronic Microelectronics Center,Harbin Institute of Technology,Harbin 150001,China Microelectronics Center,Harbin Institute of Technology at Weihai,Weihai 264209,China

国际会议

2012 2nd IEEE International Conference on Cloud Computing and Intelligence Systems (2012年第2届IEEE云计算与智能系统国际会议(IEEE CCIS2012))

杭州

英文

1701-1706

2012-10-30(万方平台首次上网日期,不代表论文的发表时间)