Lightweight cryptography is a novel diversion from conventional cryptography that targets internet-of-things (IoT) platform due to resource constraints. In comparison, it offers smaller cryptographic primitives such as shorter key sizes, block sizes and lesser energy drainage. The main focus can be seen in algorithm developments in this emerging subject. Thus, verification is carried out based upon theoretical (mathematical) proofs mostly. Among the few available side-channel analysis studies found in literature, the highest percentage is taken by power attacks. PRESENT is a promising lightweight block cipher to be included in IoT devices in the near future. Thus, the emphasis of this paper is on lightweight cryptology, and our investigation shows unavailability of a correlation electromagnetic analysis (CEMA) of it. Hence, in an effort to fill in this research gap, we opted to investigate the capabilities of CEMA against the PRESENT algorithm. This work aims to determine the probability of secret key leakage with a minimum number of electromagnetic (EM) waveforms possible. The process initially started from a simple EM analysis (SEMA) and gradually enhanced up to a CEMA. This paper presents our methodology in attack modelling, current results that indicate a probability of leaking seven bytes of the key and upcoming plans for optimisation. In addition, introductions to lightweight cryptanalysis and theories of EMA are also included.
翻译:轻量的加密法是一种新颖的改变,它来自常规的加密法,它针对的是因资源限制而成为互联网(IoT)平台的隐蔽技术。相比之下,它提供了较小的加密原始材料,例如较轻的钥匙大小、区块大小和较少的能量排水。主要焦点可见于这个新兴主题的算法发展。因此,核查主要根据理论(数学)证据进行。在文献中发现的为数不多的边道分析研究中,最大的比例是电磁攻击。PRESENT是一个有希望的轻质块,在不久的将来将被纳入IoT设备。因此,本文的重点是轻量的加密学,我们的调查显示,在这个新兴主题中,没有相关的电磁分析(CEMMA),因此,我们选择了调查CEMA相对于PRESENT算法的能力。这项工作旨在确定隐性钥匙泄漏的可能性,最小数量的电磁波波成形。从简单的EMA分析开始,这个过程最初从简单的EMA分析开始, 并逐渐地展示了我们即将推出的EEMA模型的概率。