Proceedings of the 1st ACM Workshop on Cyber-Physical System Security 2015
DOI: 10.1145/2732198.2732207
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Analysis of PRINCE and RECTANGLE using CPA

Abstract: As Internet of Things (IoT) evolves very rapidly, security components (cryptographic algorithm, protocol) of embedded devices need to be secure against software and physical attacks. However, the performance factors namely speed, area, and power play a major role in selection of security components for a resource constrained embedded devices. Subsequently, cryptographers are more attentive on designing lightweight ciphers to protect the information in such devices. PRINCE [3] and RECTANGLE [18] lightweight blo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…An evaluation of both an unmasked and a masked implementation of Simon for FPGAs was reported in [5]. In [33], the vulnerability of PRINCE and RECTANGLE against DPA is studied. A second line of research focussed on the design of new ligthweight primitives that can be efficiently protected against DPA via masking; representative examples include PICARO [30], Zorro [15], and the LS-designs Robin and Fantomas [17].…”
Section: Introductionmentioning
confidence: 99%
“…An evaluation of both an unmasked and a masked implementation of Simon for FPGAs was reported in [5]. In [33], the vulnerability of PRINCE and RECTANGLE against DPA is studied. A second line of research focussed on the design of new ligthweight primitives that can be efficiently protected against DPA via masking; representative examples include PICARO [30], Zorro [15], and the LS-designs Robin and Fantomas [17].…”
Section: Introductionmentioning
confidence: 99%
“…Since its introduction, a significant amount of work has been done on the side channel leakage characteristics of PRINCE. CPA attacks have shown a successful recovery of the correct key in a round-based implementation of PRINCE on a SASEBO-G FPGA where the same hardware was re-used iteratively in a loop to compute each round of the encryption operation [24]. A similar analysis was shown for a DPA attack as well.…”
Section: B Related Workmentioning
confidence: 74%
“…This set of ciphers covers a huge vary of numerous style precept and consists of range of new proposals with interest grabbing residences, we tend to accrued among 2 and up to 20 4 implementations of every cipher to account for diverse change offs among execution time, RAM footprint, and code length. For 9 out of the 19 ciphers we have were given not solely C implementations, but additionally optimized assembly code for the three plate forms we tend to ponder, In overall, our repository consists of over 250 implementations, of that we generally tend to developed kind of scratch [8]. The ASCII textual content document of all our implementations is offered below GPL and might be downloaded from the CryptoLUX wiki victimization the given hyperlink.…”
Section: Review Criteriamentioning
confidence: 99%