A more practical CPA attack against present hardware implementation

In CHES 2007, Bogdanov et al. proposed an ultra-lightweight block cipher named PRESENT, which has been included in the new international standard ISO/IEC 29192-2:2012. The correlation power analysis (CPA) attack against PRESENT is discussed in this paper. The first power analysis attack against the...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Chenxu Wang, Mingyan Yu, Jinxiang Wang, Peihe Jiang, Xiaochen Tang
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:In CHES 2007, Bogdanov et al. proposed an ultra-lightweight block cipher named PRESENT, which has been included in the new international standard ISO/IEC 29192-2:2012. The correlation power analysis (CPA) attack against PRESENT is discussed in this paper. The first power analysis attack against the hardware implementation of PRESENT has been proposed by Zhang et al. in 2010. In this paper, we proposed a more practical attack method which does not need to reset the attacked device before each measurement. In order to test our method, we built a power consumption acquisition platform based on simulation and used two attack models to reveal the secret key via CPA. These two models need at least 450 and 230 plaintexts to successfully disclose the first round key, respectively. The results showed PRESENT cipher's vulnerability to power analysis attack.
ISSN:2376-5933
2376-595X
DOI:10.1109/CCIS.2012.6664584