Research Output
Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device
  Traditional cryptographic techniques have proven to work well on most modern computing devices but they are unsuitable for devices (e.g. IoT devices) where memory, power consumption or processing power is limited. Thus, there has been an increasing amount of work on the design and implementation of lightweight cryptographic algorithms to provide a solution for running cryptography on low resource devices. One particular cryptographic algorithm designed specifically to be used on low resource devices is the PRESENT algorithm. Although the design of PRESENT provides a small memory footprint alongside low power consumption our results show it is susceptible to information leakage when power analysis is performed against a device running this algorithm. In this paper, we present our methodology and results on performing correlation power analysis against this light weight block cipher. Our chosen device under test is an Arduino Uno which was programmed to run the Add Round Key and S-Box functions of PRESENT during the first round of encryptions. Results demonstrate that the Add Round Key function is susceptible to information leakage but a high number of false-positives were observed. Greater success was obtained when targeting the S-Box of the PRESENT algorithm and we were able to derive the first 8 bytes of the key.

  • Date:

    27 August 2018

  • Publication Status:

    Published

  • Publisher

    ACM Press

  • DOI:

    10.1145/3230833.3232801

  • Library of Congress:

    QA76 Computer software

  • Dewey Decimal Classification:

    005.8 Data security

  • Funders:

    Centre for Sensor and Imaging Systems

Citation

Lo, O., Buchanan, W. J., & Carson, D. (2018). Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. In ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Securityhttps://doi.org/10.1145/3230833.3232801

Authors

Keywords

Side channel attacks, power analysis, cryptography, PRESENT, Internet of Things

Monthly Views:

Available Documents
  • pdf

    Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device

    1MB

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the
    author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org.
    ARES 2018, August 27–30, 2018, Hamburg, Germany
    © 2018 Copyright held by the owner/author(s). Publication rights licensed to ACM.
    ACM ISBN 978-1-4503-6448-5/18/08. . . $15.00
    https://doi.org/10.1145/3230833.3232801

  • Downloadable citations

    HTML BIB RTF