Font Size: a A A

Differential Power Analysis And Countermeasures On Ultra-Lightweight Block Cipher--Present

Posted on:2014-02-28Degree:MasterType:Thesis
Country:ChinaCandidate:J YangFull Text:PDF
GTID:2248330398974743Subject:Information security
Abstract/Summary:PDF Full Text Request
In the practical application of the cryptographic algorithm, the cryptographic algorithm usually is implemented using some cryptographic devices via software or hardware. Because it must leak information during cryptographic algorithms operating in equipment, and attackers can obtain this leadking information and analyze the correlation between them and keys. The Side Channel Attack(SCA) is a attack that utilizing the correlation to narrow the key’s searching range, even to obtain the real key directly. Among all of Side-Channel Attack,Differential Power Analysis attack is the most dangerous and the most easily performed. The instantaneous energy of cryptographic equipment depends on the data which is handled by device and the operation that device made, and attackers can gain the key of cryptographic equipment in the basis of this relationship.PRESENT is a ultra-lightweight block cipher which is based on the SPN (Substitution Permutation Network)structure, and it is put forward by A. ogdanov, L.R.K nuden and G.L ender et al in the CHES in2007.It is designed for synthetically considering the security and limited caculation resources, and it integrates the characteristic of Serpent which is one of the five Candidate algorithms of AES and DES during designing the PRESENT.. The hardware implementation of PRESENT-80bit algorithm only needs about1570NAND gate, and it is a typical ultra-lightweight cipher algorithm.This thesis research template attack of PRESENT, and compares it with the first-order differential power attack. The main research work is as follows:1. It studied Differential Power Attacks against block cipher algorithm PRESENT, and analyzed the choice of power consumption model.In the first,we realize the algorithm with hardware language Verilog, simulate it in the software Modelsim to get the VCD file, and obtain the power data. Treating the resulting power consumption data by the power attacks platform developed in this paper, and showing the power consumption curve.The final results showed that it is effective by DPA for PRESENT cryptographic algorithm without protection.2. According to the method of protection of DPA, this paper presents the implementation of PRESENT algorithm with effective protection scheme, and simulates it.Research result show that the PRESENT algorithm having the protection scheme can resist differential power attack.3. It studied and simulated Second-order differential power attacks against block cipher algorithm PRESENT, and did some understanding of the second-order differential protection power attack to provide the reference for the implementation of the PRESENT algorithm.
Keywords/Search Tags:Differential power attack, PRESENT cipher, energy analysis, power model
PDF Full Text Request
Related items