TY - GEN
T1 - Side-Channel Analysis and Countermeasures of Domestic Block Cipher uBlock
AU - Shang, Xinyan
AU - Liang, Kaifeng
AU - Wei, Congming
AU - Ding, Yaoling
AU - Sun, Shaofei
AU - Wang, An
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - Nowadays, IoT devices are ubiquitous. Addressing data security issues in resource-limited devices is a key focus of IoT security. Therefore, lightweight cryptographic algorithms and their security research have received increasing attention. The uBlock is a lightweight block cipher proposed in 2019, which has advantages in software performance and hardware implementation, such as efficiency and low energy consumption. Research shows that the uBlock can effectively resist traditional analysis methods such as integral analysis and differential analysis. However, there is currently a lack of related research showing that the uBlock can effectively resist side-channel analysis. In this paper, we successfully complete the correlation power analysis on the uBlock and give specific experimental results. Subsequently, we propose a masking countermeasure for the uBlock software implementation and prove its security against correlation power analysis. Its implementation shows that the protected uBlock has increased code size, time, and RAM consumption by 37.73%, 38.31%, and 20.80%, respectively, compared to the unprotected one.
AB - Nowadays, IoT devices are ubiquitous. Addressing data security issues in resource-limited devices is a key focus of IoT security. Therefore, lightweight cryptographic algorithms and their security research have received increasing attention. The uBlock is a lightweight block cipher proposed in 2019, which has advantages in software performance and hardware implementation, such as efficiency and low energy consumption. Research shows that the uBlock can effectively resist traditional analysis methods such as integral analysis and differential analysis. However, there is currently a lack of related research showing that the uBlock can effectively resist side-channel analysis. In this paper, we successfully complete the correlation power analysis on the uBlock and give specific experimental results. Subsequently, we propose a masking countermeasure for the uBlock software implementation and prove its security against correlation power analysis. Its implementation shows that the protected uBlock has increased code size, time, and RAM consumption by 37.73%, 38.31%, and 20.80%, respectively, compared to the unprotected one.
KW - domestic cipher
KW - masking countermeasure
KW - side-channel analysis
KW - uBlock
UR - http://www.scopus.com/inward/record.url?scp=85184997356&partnerID=8YFLogxK
U2 - 10.1109/ICICN59530.2023.10392872
DO - 10.1109/ICICN59530.2023.10392872
M3 - Conference contribution
AN - SCOPUS:85184997356
T3 - ICICN 2023 - 2023 IEEE 11th International Conference on Information, Communication and Networks
SP - 415
EP - 419
BT - ICICN 2023 - 2023 IEEE 11th International Conference on Information, Communication and Networks
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2023 IEEE 11th International Conference on Information, Communication and Networks, ICICN 2023
Y2 - 17 August 2023 through 20 August 2023
ER -