Back to Search Start Over

Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher

Authors :
Gunathilake, Nilupulee A.
Al-Dubai, Ahmed
Buchanan, William J.
Lo, Owen
Source :
2022 IEEE 6th International Conference on Cryptography, Security and Privacy (CSP 2022)
Publication Year :
2021

Abstract

Lightweight cryptography is a novel diversion from conventional cryptography that targets internet-of-things (IoT) platform due to resource constraints. In comparison, it offers smaller cryptographic primitives such as shorter key sizes, block sizes and lesser energy drainage. The main focus can be seen in algorithm developments in this emerging subject. Thus, verification is carried out based upon theoretical (mathematical) proofs mostly. Among the few available side-channel analysis studies found in literature, the highest percentage is taken by power attacks. PRESENT is a promising lightweight block cipher to be included in IoT devices in the near future. Thus, the emphasis of this paper is on lightweight cryptology, and our investigation shows unavailability of a correlation electromagnetic analysis (CEMA) of it. Hence, in an effort to fill in this research gap, we opted to investigate the capabilities of CEMA against the PRESENT algorithm. This work aims to determine the probability of secret key leakage with a minimum number of electromagnetic (EM) waveforms possible. The process initially started from a simple EM analysis (SEMA) and gradually enhanced up to a CEMA. This paper presents our methodology in attack modelling, current results that indicate a probability of leaking seven bytes of the key and upcoming plans for optimisation. In addition, introductions to lightweight cryptanalysis and theories of EMA are also included.

Details

Database :
arXiv
Journal :
2022 IEEE 6th International Conference on Cryptography, Security and Privacy (CSP 2022)
Publication Type :
Report
Accession number :
edsarx.2112.12232
Document Type :
Working Paper