首页> 外文会议>International Conference on Field Programmable Technology >Comparing the cost of protecting selected lightweight block ciphers against differential power analysis in low-cost FPGAs
【24h】

Comparing the cost of protecting selected lightweight block ciphers against differential power analysis in low-cost FPGAs

机译:比较在低成本FPGA中保护选定的轻量级分组密码免受差分功率分析的成本

获取原文

摘要

Lightweight block ciphers are an important topic in the Internet of Things (IoT), since they provide moderate security, while requiring fewer resources than AES. Ongoing cryptographic contests and standardization efforts evaluate lightweight block ciphers on their resistance to power analysis side channel attack (SCA), and the ability to apply countermeasures. While some ciphers have been individually evaluated, a large scale comparison of resistance to side channel attack and formulation of the relative cost of implementing countermeasures is difficult, since researchers typically use varied architectures, optimization strategies, technologies, and evaluation techniques. In this research we leverage the t-test leakage detection methodology and an open-source side channel analysis suite (FOBOS) to compare FPGA implementations of AES, SIMON, SPECK, PRESENT, LED, and TWINE, using a choice of architecture targeted to optimize throughput-to-area (TP/A) ratio, for resistance to differential power analysis (DPA). We then apply an equivalent level of protection to the above ciphers using 3-share threshold implementations (TI), and verify improved resistance to DPA. We find that SIMON has the highest TP/A ratio of protected versions, followed by PRESENT, TWINE, LED, AES, and SPECK. However, PRESENT uses the least energy in terms of nJ-per-bit.
机译:轻量级分组密码是物联网(IoT)中的一个重要主题,因为它们提供适度的安全性,同时所需的资源比AES少。正在进行的密码竞赛和标准化工作评估了轻量级分组密码对功率分析侧信道攻击(SCA)的抵抗力以及采取对策的能力。尽管已经对某些密码进行了单独评估,但由于研究人员通常使用各种体系结构,优化策略,技术和评估技术,因此难以对侧信道攻击的抵抗力进行大规模比较以及制定对策的相对成本是困难的。在这项研究中,我们利用t检验泄漏检测方法和开源侧通道分析套件(FOBOS),使用针对性优化的架构选择来比较AES,SIMON,SPECK,PRESENT,LED和TWINE的FPGA实现。吞吐量/面积(TP / A)比率,用于抵抗差分功率分析(DPA)。然后,我们使用3共享阈值实施(TI)对上述密码应用同等级别的保护,并验证对DPA的抵抗力得到改善。我们发现SIMON具有受保护版本的TP / A比率最高,其次是PRESENT,TWINE,LED,AES和SPECK。然而,就每位nJ而言,PRESENT消耗的能量最少。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号