Visible to the public Lightweight Cipher Aware Countermeasure Using Random Number Masks and Its Evaluation

TitleLightweight Cipher Aware Countermeasure Using Random Number Masks and Its Evaluation
Publication TypeConference Paper
Year of Publication2018
AuthorsYoshikawa, Masaya, Nozaki, Yusuke
Conference NameProceedings of the 2Nd International Conference on Vision, Image and Signal Processing
PublisherACM
ISBN Number978-1-4503-6529-1
Keywordshuman factors, Lightweight Cipher, Metrics, pubcrawl, Scalability, Scurity of IoT Device, side channel attack, Tamper resistance
Abstract

Recent advancements in the Internet of Things (IoT) technology has left built-in devices vulnerable to interference from external networks. Power analysis attacks against cryptographic circuits are of particular concern, as they operate by illegally analyzing confidential information via power consumption of a cryptographic circuit. In response to these threats, many researchers have turned to lightweight ciphers, which can be embedded in small-scale circuits, coupled with countermeasures to increase built-in device security, even against power analysis attacks. However, while researchers have examined the efficacy of embedding lightweight ciphers in circuits, neither cost nor tamper resistance have been considered in detail. To use lightweight ciphers and improve tamper resistance in the future, it is necessary to investigate the relationship between the cost of embedding a lightweight cipher with a countermeasure against power analysis in a circuit and the tamper resistance of the cipher. Accordingly, the present study determined the tamper resistance of TWINE, a typical lightweight cipher, both with and without a countermeasure; costs were calculated for embedding the cipher with and without a countermeasure as well.

URLhttps://dl.acm.org/citation.cfm?doid=3271553.3271595
DOI10.1145/3271553.3271595
Citation Keyyoshikawa_lightweight_2018