Power Analysis and Protection on SPECK and Its Application in IoT

Jing Ge, An Wang*, Liehuang Zhu, Xin Liu, Ning Shang, Guoshuang Zhang

*此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

3 引用 (Scopus)

摘要

Emerging applications such as the Internet of Things (IoT) promotes the development of lightweight cryptography. SPECK is a lightweight block cipher, specially designed for limited resource devices that was presented by National Security Agency. Nevertheless, before using SPECK in any practical application, protection against side-channel attacks must be paid attention to. In this paper, we take two attack positions into account and make effort to implement correlation power analysis on a naive software implementation of SPECK algorithm in the IoT application scenario. Our experimental results show that the real key fixed in the register can be successfully recovered when attack the XOR operations, while there is always an interference item that confuses the correct key when attack the modulo addition operation. Furthermore, we proposal a countermeasure against power attacks in the IoT application, and the protected SPECK only cost 53.01%, 6.27% and 318.18% of extra code, RAM and time, respectively.

源语言英语
主期刊名Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings
编辑Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen
出版商Springer
350-362
页数13
ISBN(印刷版)9783030372309
DOI
出版状态已出版 - 2019
活动15th International Conference on Security and Privacy in Communication Networks, SecureComm 2019 - Orlando , 美国
期限: 23 10月 201925 10月 2019

出版系列

姓名Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
305 LNICST
ISSN(印刷版)1867-8211

会议

会议15th International Conference on Security and Privacy in Communication Networks, SecureComm 2019
国家/地区美国
Orlando
时期23/10/1925/10/19

指纹

探究 'Power Analysis and Protection on SPECK and Its Application in IoT' 的科研主题。它们共同构成独一无二的指纹。

引用此