首页> 外文期刊>Computers >Comparing the Cost of Protecting Selected Lightweight Block Ciphers against Differential Power Analysis in Low-Cost FPGAs ?
【24h】

Comparing the Cost of Protecting Selected Lightweight Block Ciphers against Differential Power Analysis in Low-Cost FPGAs ?

机译:比较在低成本FPGA中保护所选轻量级分组密码免受差分功率分析的成本?

获取原文
       

摘要

Lightweight block ciphers are an important topic in the Internet of Things (IoT) since they provide moderate security while requiring fewer resources than the Advanced Encryption Standard (AES). Ongoing cryptographic contests and standardization efforts evaluate lightweight block ciphers on their resistance to power analysis side channel attack (SCA), and the ability to apply countermeasures. While some ciphers have been individually evaluated, a large-scale comparison of resistance to side channel attack and the formulation of absolute and relative costs of implementing countermeasures is difficult, since researchers typically use varied architectures, optimization strategies, technologies, and evaluation techniques. In this research, we leverage the Test Vector Leakage Assessment (TVLA) methodology and the FOBOS SCA framework to compare FPGA implementations of AES, SIMON, SPECK, PRESENT, LED, and TWINE, using a choice of architecture targeted to optimize throughput-to-area (TP/A) ratio and suitable for introducing countermeasures to Differential Power Analysis (DPA). We then apply an equivalent level of protection to the above ciphers using 3-share threshold implementations (TI) and verify the improved resistance to DPA. We find that SIMON has the highest absolute TP/A ratio of protected versions, as well as the lowest relative cost of protection in terms of TP/A ratio. Additionally, PRESENT uses the least energy per bit (E/bit) of all protected implementations, while AES has the lowest relative cost of protection in terms of increased E/bit.
机译:轻量级分组密码是物联网(IoT)中的一个重要主题,因为它们提供了适度的安全性,同时与高级加密标准(AES)相比所需的资源更少。正在进行的密码竞赛和标准化工作评估了轻量级分组密码对功率分析侧信道攻击(SCA)的抵抗力以及采取对策的能力。尽管已经对某些密码进行了单独评估,但由于研究人员通常使用各种体系结构,优化策略,技术和评估技术,因此难以对侧信道攻击的抵抗力以及实施对策的绝对和相对成本进行大规模比较。在这项研究中,我们利用测试矢量泄漏评估(TVLA)方法和FOBOS SCA框架来比较AES,SIMON,SPECK,PRESENT,LED和TWINE的FPGA实现,并使用了旨在优化吞吐量的架构选择。面积(TP / A)比率,适合将对策引入差分功率分析(DPA)。然后,我们使用3共享阈值实现(TI)对上述密码应用同等级别的保护,并验证对DPA的改进抵抗力。我们发现SIMON具有受保护版本的绝对TP / A比率最高,并且就TP / A比率而言,具有最低的相对保护成本。此外,在所有受保护的实现中,PRESENT使用的每比特能量(E / bit)最少,而就增加的E / bit而言,AES的相对保护成本最低。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号