2016
DOI: 10.1007/978-3-319-39555-5_29
|View full text |Cite
|
Sign up to set email alerts
|

Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice

Abstract: Abstract. Side-Channel Analysis (SCA) represents a serious threat to the security of millions of smart devices that form part of the so-called Internet of Things (IoT). Choosing the "right" cryptographic primitive for the IoT is a highly challenging task due to the resource constraints of IoT devices and the variety of primitives. An important criterion to assess the suitability of a lightweight cipher with respect to SCA is the amount of leakage available to an adversary. In this paper, we analyze the efficie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
30
1

Year Published

2016
2016
2019
2019

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 22 publications
(32 citation statements)
references
References 32 publications
1
30
1
Order By: Relevance
“…can not be used in a feedback mode of operation such as CCM), the bitsliced implementations have a lower CPA leakage than implementations using lookup tables [4], but they are still vulnerable to DPA attacks [3].…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…can not be used in a feedback mode of operation such as CCM), the bitsliced implementations have a lower CPA leakage than implementations using lookup tables [4], but they are still vulnerable to DPA attacks [3].…”
Section: Resultsmentioning
confidence: 99%
“…Biryukov et al [4] introduced the correlation coefficient difference metric to analyze the leakage of different selection functions in the context of CPA. The correlation coefficient difference δ gives the difference between the correlation coefficient of the correct key and the correlation coefficient of the most likely key guess, where the most likely key is different from the correct key.…”
Section: Quantifying the Leakagementioning
confidence: 99%
See 1 more Smart Citation
“…The number of general-purpose registers determines whether the entire cipher's state can be fitted into registers or whether a part of it has to be spilled to RAM. Memory operations are generally slower than register operations, consume more energy and increase the vulnerability of an implementation to side channel attacks [24]. Thus, the number of memory operations should be reduced as much as possible.…”
Section: Software Implementationmentioning
confidence: 99%
“…The absence of look-up tables reduces the memory requirements and provides, according to [24], some intrinsic resistance against power analysis attacks.…”
Section: Evaluation and Comparisonmentioning
confidence: 99%