Skip to main content

Power Analysis Attack and Its Countermeasure for a Lightweight Block Cipher Simon

  • Conference paper
  • First Online:
Information Technology: New Generations

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 448))

Abstract

This study proposes a power analysis attack and a countermeasure for a lightweight cipher Simon. Simon can be embedded in the smallest area among lightweight block ciphers. In the proposed power analysis method, an analysis based on conventional power analysis attacks is applied to Simon. In the proposed countermeasure, random masks are applied to data resisters. Experiments revealed the vulnerability of the normal implementation method and verified the validity of the proposed countermeasure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK Families of Lightweight Block Ciphers. Cryptography ePrint Archive, Report 2013/404 (2013) http://eprint.iacr.org/

  2. National Security Agency. https://www.nsa.gov/

  3. Bogdanav, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B, Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Proceedings of 9th International Workshop Cryptographic Hardware and Embedded Systems (CHES 2007). LNCS, vol. 4727, pp. 450‒466. Springer (2007)

    Google Scholar 

  4. Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: an ultra-lightweight blockcipher. In: Proceedings of 13th International Workshop Cryptographic Hardware and Embedded Systems (CHES 2011). LNCS, vol. 6917, pp. 342‒357. Springer (2011)

    Google Scholar 

  5. Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: TWINE: a lightweight, versatile blockcipher. In: Proceedings of ECRYPT Workshop on Lightweight Cryptography (LC11), pp. 146‒149 (2011)

    Google Scholar 

  6. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Proceedings of International Cryptology Conference (CRYPTO 1999). LNCS, vol. 1666, pp. 388‒397 (1999)

    Google Scholar 

  7. Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Proceedings of 6th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004). LNCS, vol. 3156, pp. 16‒29. Springer (2004)

    Google Scholar 

  8. Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: Proceedings of 3rd International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2001). LNCS, vol. 2162, pp. 251‒261. Springer (2001)

    Google Scholar 

  9. Meynard, O., Guilley, S., Danger, J.-L., Sauvage, L.: Far correlation-based EMA with a precharacterized leakage model. In: Proceedings of Design, Automation and Test in Europe (DATE 2010), pp. 977‒980 (2010)

    Google Scholar 

  10. Federal Information Processing Standards (FIPS) Publication 197: Advanced Encryption Standard (AES), U. S. Department of Commerce/National Institute of Standard and Technology (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Masaya Yoshikawa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Yoshikawa, M., Nozaki, Y. (2016). Power Analysis Attack and Its Countermeasure for a Lightweight Block Cipher Simon. In: Latifi, S. (eds) Information Technology: New Generations. Advances in Intelligent Systems and Computing, vol 448. Springer, Cham. https://doi.org/10.1007/978-3-319-32467-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-32467-8_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-32466-1

  • Online ISBN: 978-3-319-32467-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics