Skip to main content

Research Repository

Advanced Search

Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device

Lo, Owen; Buchanan, William J.; Carson, Douglas

Authors

Douglas Carson



Abstract

Traditional cryptographic techniques have proven to work well on most modern computing devices but they are unsuitable for devices (e.g. IoT devices) where memory, power consumption or processing power is limited. Thus, there has been an increasing amount of work on the design and implementation of lightweight cryptographic algorithms to provide a solution for running cryptography on low resource devices. One particular cryptographic algorithm designed specifically to be used on low resource devices is the PRESENT algorithm. Although the design of PRESENT provides a small memory footprint alongside low power consumption our results show it is susceptible to information leakage when power analysis is performed against a device running this algorithm. In this paper, we present our methodology and results on performing correlation power analysis against this light weight block cipher. Our chosen device under test is an Arduino Uno which was programmed to run the Add Round Key and S-Box functions of PRESENT during the first round of encryptions. Results demonstrate that the Add Round Key function is susceptible to information leakage but a high number of false-positives were observed. Greater success was obtained when targeting the S-Box of the PRESENT algorithm and we were able to derive the first 8 bytes of the key.

Citation

Lo, O., Buchanan, W. J., & Carson, D. (2018). Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. In ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security. https://doi.org/10.1145/3230833.3232801

Conference Name ACM Proceedings of the 13th International Conference on Availability, Reliability and Security
Conference Location Hamburg, Germany
Start Date Aug 27, 2018
End Date Aug 30, 2018
Acceptance Date Jun 1, 2018
Online Publication Date Aug 27, 2018
Publication Date 2018
Deposit Date Aug 14, 2018
Publicly Available Date Aug 28, 2018
Publisher Association for Computing Machinery (ACM)
Book Title ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security
ISBN 9781450364485
DOI https://doi.org/10.1145/3230833.3232801
Keywords Side channel attacks, power analysis, cryptography, PRESENT, Internet of Things
Public URL http://researchrepository.napier.ac.uk/Output/1274747

Files

Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device (2 Mb)
PDF

Copyright Statement
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the
author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org.
ARES 2018, August 27–30, 2018, Hamburg, Germany
© 2018 Copyright held by the owner/author(s). Publication rights licensed to ACM.
ACM ISBN 978-1-4503-6448-5/18/08. . . $15.00
https://doi.org/10.1145/3230833.3232801







You might also like



Downloadable Citations