Electromagnetic Side-Channel Analysis of PRESENT Lightweight Cipher
By: Nilupulee A Gunathilake , Owen Lo , William J Buchanan and more
Potential Business Impact:
Finds secret codes by watching computer signals.
Side-channel vulnerabilities pose an increasing threat to cryptographically protected devices. Consequently, it is crucial to observe information leakages through physical parameters such as power consumption and electromagnetic (EM) radiation to reduce susceptibility during interactions with cryptographic functions. EM side-channel attacks are becoming more prevalent. PRESENT is a promising lightweight cryptographic algorithm expected to be incorporated into Internet-of-Things (IoT) devices in the future. This research investigates the EM side-channel robustness of PRESENT using a correlation attack model. This work extends our previous Correlation EM Analysis (CEMA) of PRESENT with improved results. The attack targets the Substitution box (S-box) and can retrieve 8 bytes of the 10-byte encryption key with a minimum of 256 EM waveforms. This paper presents the process of EM attack modelling, encompassing both simple and correlation attacks, followed by a critical analysis.
Similar Papers
Extended Abstract: Synthesizable Low-overhead Circuit-level Countermeasures and Pro-Active Detection Techniques for Power and EM SCA
Cryptography and Security
Protects secret computer codes from being stolen.
Side Channel Analysis in Homomorphic Encryption
Cryptography and Security
Protects secret computer information from being spied on.
Breaking ECDSA with Electromagnetic Side-Channel Attacks: Challenges and Practicality on Modern Smartphones
Cryptography and Security
Lets hackers steal phone secrets using tiny signals.