A more practical CPA attack against present hardware implementation
In CHES 2007, Bogdanov et al. proposed an ultra-lightweight block cipher named PRESENT, which has been included in the new international standard ISO/IEC 29192-2:2012. The correlation power analysis (CPA) attack against PRESENT is discussed in this paper. The first power analysis attack against the...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In CHES 2007, Bogdanov et al. proposed an ultra-lightweight block cipher named PRESENT, which has been included in the new international standard ISO/IEC 29192-2:2012. The correlation power analysis (CPA) attack against PRESENT is discussed in this paper. The first power analysis attack against the hardware implementation of PRESENT has been proposed by Zhang et al. in 2010. In this paper, we proposed a more practical attack method which does not need to reset the attacked device before each measurement. In order to test our method, we built a power consumption acquisition platform based on simulation and used two attack models to reveal the secret key via CPA. These two models need at least 450 and 230 plaintexts to successfully disclose the first round key, respectively. The results showed PRESENT cipher's vulnerability to power analysis attack. |
---|---|
ISSN: | 2376-5933 2376-595X |
DOI: | 10.1109/CCIS.2012.6664584 |