Computer Science ›› 2011, Vol. 38 ›› Issue (11): 40-42.

Previous Articles     Next Articles

Research on Correlation Power Analysis Attack against PRESENT

LIU Hui-ying,WANG Tao,ZHAO Xin-jie,ZHOU Lin   

  • Online:2018-12-01 Published:2018-12-01

Abstract: The correlation power analysis attack against PRESENT was discussed in this paper. An correlation power attack method according to the sbox in PRESEN T cipher was presented based on hamming distance power leakage model. The results of experiment indicate that hardware implementation of PRESENT without protection measure is vulnerable to correlation power analysis attacks. The 64-bit first round expanded key can be recovered with 5 power traces,and the 80-bit PRESENT master key searching space can be reduced to 216,so that cryptographic devices should be protected to prevent this kind of attack.

Key words: PRESENT, Side channel attacks, Hamming distance, Power consumption model, Correlation power analysis

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!