Please use this identifier to cite or link to this item:
https://doi.org/10.1109/AsianHOST53231.2021.9699610
DC Field | Value | |
---|---|---|
dc.title | Last-round and Joint First/Last-Round Power Analysis Attacks on PRESENT | |
dc.contributor.author | Qiang Fang | |
dc.contributor.author | Alioto,Massimo Bruno | |
dc.date.accessioned | 2022-05-18T08:27:22Z | |
dc.date.available | 2022-05-18T08:27:22Z | |
dc.date.issued | 2022-02-14 | |
dc.identifier.citation | Qiang Fang, Alioto,Massimo Bruno (2022-02-14). Last-round and Joint First/Last-Round Power Analysis Attacks on PRESENT. 2021 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) : 1-6. ScholarBank@NUS Repository. https://doi.org/10.1109/AsianHOST53231.2021.9699610 | |
dc.identifier.uri | https://scholarbank.nus.edu.sg/handle/10635/225676 | |
dc.description.abstract | This paper explores new power analysis attacks on cryptographic circuits based on the PRESENT cipher, and discloses an unreported vulnerability of this cipher. For the first time, an attack to the last round is introduced to identify the secret key based on the knowledge of ciphertext, as opposed to conventional attacks based on the first round (i.e., knowledge of plaintext). This attack is enabled by the analysis of the bit-permutation structure in the last round, and by introducing a suitable bit regrouping strategy. As further contribution, a more powerful attack combining first/last-round Correlation Power Analysis attacks with Top-N guess strategy is demonstrated. The analysis and the attack results show that the optimal choice of Top-N key guesses makes the proposed attack more powerful than a conventional single-round attack, reducing the number of power traces required by 34%. | |
dc.description.uri | https://ieeexplore-ieee-org.libproxy1.nus.edu.sg/abstract/document/9699610 | |
dc.language.iso | en | |
dc.publisher | IEEE | |
dc.subject | CPA | |
dc.subject | PRESENT | |
dc.subject | bit permutation | |
dc.subject | bit regrouping | |
dc.subject | joint first/last-round attacks | |
dc.subject | Top-N guess combination | |
dc.type | Conference Paper | |
dc.contributor.department | ELECTRICAL AND COMPUTER ENGINEERING | |
dc.description.doi | 10.1109/AsianHOST53231.2021.9699610 | |
dc.description.sourcetitle | 2021 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) | |
dc.description.page | 1-6 | |
dc.published.state | Published | |
dc.grant.id | “SOCure” grant NRF2018NCR-NCR002-0001 | |
dc.grant.fundingagency | Singapore National Research Foundation | |
dc.relation.dataset | 10.1109/AsianHOST53231.2021.9699610 | |
Appears in Collections: | Staff Publications Elements Students Publications |
Show simple item record
Files in This Item:
File | Description | Size | Format | Access Settings | Version | |
---|---|---|---|---|---|---|
post_print_paper_1_AsianHOST_2021.pdf | post-print version | 1.51 MB | Adobe PDF | OPEN | Post-print | View/Download |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.