Abstract
This study proposes a power analysis attack and a countermeasure for a lightweight cipher Simon. Simon can be embedded in the smallest area among lightweight block ciphers. In the proposed power analysis method, an analysis based on conventional power analysis attacks is applied to Simon. In the proposed countermeasure, random masks are applied to data resisters. Experiments revealed the vulnerability of the normal implementation method and verified the validity of the proposed countermeasure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK Families of Lightweight Block Ciphers. Cryptography ePrint Archive, Report 2013/404 (2013) http://eprint.iacr.org/
National Security Agency. https://www.nsa.gov/
Bogdanav, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B, Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Proceedings of 9th International Workshop Cryptographic Hardware and Embedded Systems (CHES 2007). LNCS, vol. 4727, pp. 450‒466. Springer (2007)
Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: an ultra-lightweight blockcipher. In: Proceedings of 13th International Workshop Cryptographic Hardware and Embedded Systems (CHES 2011). LNCS, vol. 6917, pp. 342‒357. Springer (2011)
Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: TWINE: a lightweight, versatile blockcipher. In: Proceedings of ECRYPT Workshop on Lightweight Cryptography (LC11), pp. 146‒149 (2011)
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Proceedings of International Cryptology Conference (CRYPTO 1999). LNCS, vol. 1666, pp. 388‒397 (1999)
Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Proceedings of 6th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004). LNCS, vol. 3156, pp. 16‒29. Springer (2004)
Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: Proceedings of 3rd International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2001). LNCS, vol. 2162, pp. 251‒261. Springer (2001)
Meynard, O., Guilley, S., Danger, J.-L., Sauvage, L.: Far correlation-based EMA with a precharacterized leakage model. In: Proceedings of Design, Automation and Test in Europe (DATE 2010), pp. 977‒980 (2010)
Federal Information Processing Standards (FIPS) Publication 197: Advanced Encryption Standard (AES), U. S. Department of Commerce/National Institute of Standard and Technology (2001)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Yoshikawa, M., Nozaki, Y. (2016). Power Analysis Attack and Its Countermeasure for a Lightweight Block Cipher Simon. In: Latifi, S. (eds) Information Technology: New Generations. Advances in Intelligent Systems and Computing, vol 448. Springer, Cham. https://doi.org/10.1007/978-3-319-32467-8_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-32467-8_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32466-1
Online ISBN: 978-3-319-32467-8
eBook Packages: EngineeringEngineering (R0)