Xiaoyi Duan, Qi Cui, Sixiang Wang, Huawei Fang, Gaojian She
{"title":"差分功率分析攻击与PRESENT有效对抗","authors":"Xiaoyi Duan, Qi Cui, Sixiang Wang, Huawei Fang, Gaojian She","doi":"10.1109/ICCSN.2016.7586627","DOIUrl":null,"url":null,"abstract":"PRESENT is an ultra-lightweight symmetric cryptographic algorithm designed to adapt to the resource constrained computing scenarios, and it was put forward in 2007. With the continuous development of Internet of things (IoT), the application of this kind algorithm becomes increasingly popular, so the implementation security of the algorithm has correspondingly become an imperative research area. Based on the theory of side channel attack, this paper has investigated the Differential Power Analysis (DPA) technique, and taking the PRESENT algorithm as the target, it verified the feasibility of breaking the PRESENT algorithm. The test results indication that the PRESENT algorithm is vulnerable to power consumption attack under the current hardware environment. Also, to resist these attacks, this paper proposes a fixed-value mask algorithm for PRESENT.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"Differential power analysis attack and efficient countermeasures on PRESENT\",\"authors\":\"Xiaoyi Duan, Qi Cui, Sixiang Wang, Huawei Fang, Gaojian She\",\"doi\":\"10.1109/ICCSN.2016.7586627\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"PRESENT is an ultra-lightweight symmetric cryptographic algorithm designed to adapt to the resource constrained computing scenarios, and it was put forward in 2007. With the continuous development of Internet of things (IoT), the application of this kind algorithm becomes increasingly popular, so the implementation security of the algorithm has correspondingly become an imperative research area. Based on the theory of side channel attack, this paper has investigated the Differential Power Analysis (DPA) technique, and taking the PRESENT algorithm as the target, it verified the feasibility of breaking the PRESENT algorithm. The test results indication that the PRESENT algorithm is vulnerable to power consumption attack under the current hardware environment. Also, to resist these attacks, this paper proposes a fixed-value mask algorithm for PRESENT.\",\"PeriodicalId\":158877,\"journal\":{\"name\":\"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-06-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSN.2016.7586627\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSN.2016.7586627","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Differential power analysis attack and efficient countermeasures on PRESENT
PRESENT is an ultra-lightweight symmetric cryptographic algorithm designed to adapt to the resource constrained computing scenarios, and it was put forward in 2007. With the continuous development of Internet of things (IoT), the application of this kind algorithm becomes increasingly popular, so the implementation security of the algorithm has correspondingly become an imperative research area. Based on the theory of side channel attack, this paper has investigated the Differential Power Analysis (DPA) technique, and taking the PRESENT algorithm as the target, it verified the feasibility of breaking the PRESENT algorithm. The test results indication that the PRESENT algorithm is vulnerable to power consumption attack under the current hardware environment. Also, to resist these attacks, this paper proposes a fixed-value mask algorithm for PRESENT.