Font Size: a A A

Power Analysis On Lightweight Block Cipher-Present

Posted on:2012-11-13Degree:MasterType:Thesis
Country:ChinaCandidate:J ZhangFull Text:PDF
GTID:2178330338984126Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Smart cards are widespread used in many applications such as chain management, finance, manufacturing, public information service industries and so on. Some important information about the internal states may be leaked. For example, the information includes power consumption fault information, execution time and electromagnetic radiation and so on. The Power Analysis is a type of method to infer secret key by analyzing power curves of a cryptographic chip. Examples show that the leak of very small amount of power consumption information will be enough to break block ciphers completely. Therefore, it brings serious challenges for the security of Cryptographic Chips, and has drawn much attention in both domestic and overseas.PRESENT, proposed by A.Bogdanov et al. in CHES 2007, is an ultra- lightweight symmetric cipher for extremely constrained environments such as smart cards. There are several analysis methods against PRESENT, such as linear analysis, differential analysis and algebraic attack, but they are all reduced-round attack, full-round PRESENT is immune to various attacks. And now, the research of power analysis attack on PRESENT and its countermeasures is in its start step, there are many works to be done.In this thesis, we complement the PRESENT through hardware simulations and study the power analysis attacks and countermeasures on PRESENT cipher, we not only give the theory derivations, but also the experiment approaches, results and the analyses. The main innovation points are listed as follows:1. Construct a power analysis simulation platform, we complete the PRESENT and build the simulation-based experimental environment to acquire power data.2. Analyze the architecture and characters of PRESENT block cipher and present two power analysis attack method, multi-bit differential power analysis (DPA) and correlation power analysis (CPA) on PRESENT. Experimental results indicate that these two power attacks are effective to get PRESENT first round sub-key and then to get the whole key. Moreover, CPA can get a better attack effect than DPA.3. Two power analysis resistant PRESENT circuit designs based on random masking and fixed masking technologies are presented.
Keywords/Search Tags:Lightweight Block Cipher, PRESENT, DPA, CPA, Power Model
PDF Full Text Request
Related items