Xiaoyi Duan, Qi Cui, Sixiang Wang, Huawei Fang, Gaojian She
{"title":"Differential power analysis attack and efficient countermeasures on PRESENT","authors":"Xiaoyi Duan, Qi Cui, Sixiang Wang, Huawei Fang, Gaojian She","doi":"10.1109/ICCSN.2016.7586627","DOIUrl":null,"url":null,"abstract":"PRESENT is an ultra-lightweight symmetric cryptographic algorithm designed to adapt to the resource constrained computing scenarios, and it was put forward in 2007. With the continuous development of Internet of things (IoT), the application of this kind algorithm becomes increasingly popular, so the implementation security of the algorithm has correspondingly become an imperative research area. Based on the theory of side channel attack, this paper has investigated the Differential Power Analysis (DPA) technique, and taking the PRESENT algorithm as the target, it verified the feasibility of breaking the PRESENT algorithm. The test results indication that the PRESENT algorithm is vulnerable to power consumption attack under the current hardware environment. Also, to resist these attacks, this paper proposes a fixed-value mask algorithm for PRESENT.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSN.2016.7586627","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
Abstract
PRESENT is an ultra-lightweight symmetric cryptographic algorithm designed to adapt to the resource constrained computing scenarios, and it was put forward in 2007. With the continuous development of Internet of things (IoT), the application of this kind algorithm becomes increasingly popular, so the implementation security of the algorithm has correspondingly become an imperative research area. Based on the theory of side channel attack, this paper has investigated the Differential Power Analysis (DPA) technique, and taking the PRESENT algorithm as the target, it verified the feasibility of breaking the PRESENT algorithm. The test results indication that the PRESENT algorithm is vulnerable to power consumption attack under the current hardware environment. Also, to resist these attacks, this paper proposes a fixed-value mask algorithm for PRESENT.