Title :
A more practical CPA attack against present hardware implementation
Author :
Chenxu Wang ; Mingyan Yu ; Jinxiang Wang ; Peihe Jiang ; Xiaochen Tang
Author_Institution :
Microelectron. Center, Harbin Inst. of Technol. at Weihai, Weihai, China
fDate :
Oct. 30 2012-Nov. 1 2012
Abstract :
In CHES 2007, Bogdanov et al. proposed an ultra-lightweight block cipher named PRESENT, which has been included in the new international standard ISO/IEC 29192-2:2012. The correlation power analysis (CPA) attack against PRESENT is discussed in this paper. The first power analysis attack against the hardware implementation of PRESENT has been proposed by Zhang et al. in 2010. In this paper, we proposed a more practical attack method which does not need to reset the attacked device before each measurement. In order to test our method, we built a power consumption acquisition platform based on simulation and used two attack models to reveal the secret key via CPA. These two models need at least 450 and 230 plaintexts to successfully disclose the first round key, respectively. The results showed PRESENT cipher´s vulnerability to power analysis attack.
Keywords :
cryptography; PRESENT; correlation power analysis attack; power consumption acquisition platform; practical CPA attack method; present hardware implementation; secret key; ultra-lightweight block cipher; Algorithm design and analysis; Correlation; Encryption; Hardware; Logic gates; Power demand; correlation power analysis (CPA); lightweight blockcipher; power analysis attack; present;
Conference_Titel :
Cloud Computing and Intelligent Systems (CCIS), 2012 IEEE 2nd International Conference on
Conference_Location :
Hangzhou
Print_ISBN :
978-1-4673-1855-6
DOI :
10.1109/CCIS.2012.6664584