Font Size: a A A

Research On Software Implement Performance And Power Analysis On Lightweight Cryptography

Posted on:2016-01-06Degree:MasterType:Thesis
Country:ChinaCandidate:W YangFull Text:PDF
GTID:2308330464450823Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The development of Internet of Things and ubiquitous computing makes more and more portable intelligent devices such as wireless sensors, smart cards, RFID tags widely used in life. These portable intelligent devices have limited resources and computing power, and often deal with sensitive data on the safety of certain requirements. However, due to higher requirements on hardware and software resources, traditional cryptographic algorithms are not suitable to be applied on these devices. The lightweight cryptographic algorithms which achieve both performance and security requirements are suitable choice to protect data security for resource-constrained devices. However, due to the resource-constrained devices are often exposed to the open environment and easy physical contact, which making the lightweight cryptographic algorithms applied on them are vulnerable to the threat of power analysis attacks.KLEIN and ITUbee are proposed in recent years, they are software-oriented lightweight block cipher algorithms, which are different with most hardware-oriented lightweight block cipher algorithms. This makes them suitable for resource-constrained devices and particularly suitable for wireless sensors use software implementation which is flexible and easy to maintain. At present, the research of software implement performance and power analysis attacks for the two lightweight cryptographies is still inadequate. Therefore, the software implemented performances are evaluated for KLEIN and ITUbee when implemented by software. The security is researched when they suffer correlation power analysis attack. And the design solutions that can resist power analysis attack and simultaneously have less impact on their software implementation performance are made. These above studies have important theoretical significance and application reference value.This paper firstly discusses the research significance of performance evaluation and power analysis attack on KLEIN and ITUbee, and evaluates the performance of these two cryptographic algorithms when they implemented by software. We chose 8-bit microcontrollers which are widely used in wireless sensors as the experimental environment. Then KLEIN, ITUbee, PRESENT and AES are implemented by software according to the same programming specifications and optimization strategies. The four algorithms’ performance are evaluated and compared by measuring the storage occupied, the number of clock cycles required, and the throughput of encryption and decryption when being implemented by software. Evaluation results show that the software-oriented KLEIN and ITUbee in storage space occupied, execution efficiency and comprehensive performance aspects are far better than the hardware-oriented PRESENT, and in storage space occupied aspect is also better than AES which has good software implementation performance. KLEIN in execution efficiency and comprehensive performance aspects are better than these of ITUbee, but it occupied more storage space than ITUbee.Secondly, we select suitable attack points on the basis of implementing KLEIN and ITUbee in software and analyze algorithms’ process for attacking these two ciphers by CPA. When the power traces sample size is 223, we can restore its 6 byte keys in 8 byte round keys by using CPA to attack the first round of KLEIN encryption, and with the increase of the power traces sample number from 0 to 10000, the correct rate of crack key was stable at 75%. When the sample size of power traces is 54 and 43 respectively, we can restore its high 5 byte and low 5 byte in 10 byte keys by using CPA to attack the first round of ITUbee encryption and decryption respectively, and with the increase of power traces sample number from 0 to 5000, the correct rate of crack key was stable at 100%. The attack results showed that KLEIN and ITUbee are unsafe when their software implementation with no defensive measures.Finally, the mask countermeasures on KLEIN and ITUbee are respectively designed and implemented for resist power analysis attacks. Then the mask schemes’ effectiveness to resist power analysis attacks and their impact to these two cryptographic algorithms’ performance have been studied by experiment and contrast analysis. Experiments show that after adding mask schemes KLEIN and ITUbee can effectively resist power analysis attacks. Comparative analysis shows that after adding mask schemes both KLEIN and ITUbee software implementation performance are dropped. But on the whole, the software implementation of KLEIN and ITUbee with mask scheme are still belongs to the lightweight implementation.
Keywords/Search Tags:Lightweight Cryptography, KLEIN, ITUbee, Performance evaluation, CPA, Masking
PDF Full Text Request
Related items