Power Analysis and Protection on SPECK and Its Application in IoT

Jing Ge, An Wang*, Liehuang Zhu, Xin Liu, Ning Shang, Guoshuang Zhang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

Emerging applications such as the Internet of Things (IoT) promotes the development of lightweight cryptography. SPECK is a lightweight block cipher, specially designed for limited resource devices that was presented by National Security Agency. Nevertheless, before using SPECK in any practical application, protection against side-channel attacks must be paid attention to. In this paper, we take two attack positions into account and make effort to implement correlation power analysis on a naive software implementation of SPECK algorithm in the IoT application scenario. Our experimental results show that the real key fixed in the register can be successfully recovered when attack the XOR operations, while there is always an interference item that confuses the correct key when attack the modulo addition operation. Furthermore, we proposal a countermeasure against power attacks in the IoT application, and the protected SPECK only cost 53.01%, 6.27% and 318.18% of extra code, RAM and time, respectively.

Original languageEnglish
Title of host publicationSecurity and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings
EditorsSongqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen
PublisherSpringer
Pages350-362
Number of pages13
ISBN (Print)9783030372309
DOIs
Publication statusPublished - 2019
Event15th International Conference on Security and Privacy in Communication Networks, SecureComm 2019 - Orlando , United States
Duration: 23 Oct 201925 Oct 2019

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume305 LNICST
ISSN (Print)1867-8211

Conference

Conference15th International Conference on Security and Privacy in Communication Networks, SecureComm 2019
Country/TerritoryUnited States
CityOrlando
Period23/10/1925/10/19

Keywords

  • Correlation power analysis
  • Lightweight
  • Mask
  • SPECK
  • Side-channel

Fingerprint

Dive into the research topics of 'Power Analysis and Protection on SPECK and Its Application in IoT'. Together they form a unique fingerprint.

Cite this