Computer Science ›› 2011, Vol. 38 ›› Issue (11): 40-42.
Previous Articles Next Articles
LIU Hui-ying,WANG Tao,ZHAO Xin-jie,ZHOU Lin
Online:
Published:
Abstract: The correlation power analysis attack against PRESENT was discussed in this paper. An correlation power attack method according to the sbox in PRESEN T cipher was presented based on hamming distance power leakage model. The results of experiment indicate that hardware implementation of PRESENT without protection measure is vulnerable to correlation power analysis attacks. The 64-bit first round expanded key can be recovered with 5 power traces,and the 80-bit PRESENT master key searching space can be reduced to 216,so that cryptographic devices should be protected to prevent this kind of attack.
Key words: PRESENT, Side channel attacks, Hamming distance, Power consumption model, Correlation power analysis
LIU Hui-ying,WANG Tao,ZHAO Xin-jie,ZHOU Lin. Research on Correlation Power Analysis Attack against PRESENT[J].Computer Science, 2011, 38(11): 40-42.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2011/V38/I11/40
Cited