Today, Internet communication security has become more complex as technology becomes faster and more efficient, especially for resource-limited devices such as embedded devices, wireless sensors, and radio frequency identification (RFID) tags, and Internet of Things (IoT). Lightweight encryption algorithms provide security for these devices to protect data against intruders. But the limitation of using energy in lightweight block ciphers (LBCs) is one of the major challenges for ever-expanding IoT technologies. Also, these LBC are subject to Side-channel attacks, which are among the most cited threats to these ciphers. In this paper, a differential power attack (DPA) to the Midori64 block cipher is designed. According to the proposed method, an attack on the S-boxes of the first round is done to obtain half of the master key bits. Then, the S-boxes of the second round were attacked to obtain remaining the master key bits. The results confirmed that the key is ultimately obtained. With the low volume of computational complexity, we obtained the Midori block cipher key, which was considered secure, just by using 300 samples of the plaintext. Following the running of Midori64 on the AVR microcontroller of the Atmega32 model, the master key of Midori block cipher is discovered with 300 known texts. Furthermore, we obtained the master key with a smaller number of samples than the electromagnetic analysis attack.
翻译:今天,随着技术的更快和效率的提高,互联网通信安全变得更加复杂,特别是对于诸如嵌入装置、无线传感器和无线电频率识别标记等资源有限的装置,以及诸如嵌入装置、无线传感器、无线电频率识别标记和Things(IoT)互联网等资源有限。轻型加密算法为这些装置提供了保护数据不受入侵者入侵的保障。但是,限制在轻型区块密码(LBCs)中使用能源是不断扩展的IoT技术的主要挑战之一。此外,这些LBC受到侧通道攻击,而这是对这些密码最易被引用的威胁之一。在本文中,设计了对Mideori64区密码的不同功率攻击(DPA)。根据提议的方法,对第一轮S箱进行攻击是为了获得一半的主键。随后,第二轮的S-boxsbox受到攻击,以保留主键部分。结果证实,最终获得了钥匙。由于计算复杂程度较低,我们获得了Midorirefreak ci comprestrical commstrual key,我们得到了300 Rmalmagraphremagrapher 的300 romagrapher 。在300号上,我们所发现的Mrgal Krgrodu Krmtrogrogal 被发现,我们所发现了300 。