Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, continuous observations of physical leakages are essential to minimise vulnerabilities associated with cryptographic functions. Lightweight cryptography is a novel approach in progress towards internet-of-things (IoT) security. Thus, it would provide sufficient data and privacy protection in such a constrained ecosystem. IoT devices are resource-limited in terms of data rates (in kbps), power maintainability (battery) as well as hardware and software footprints (physical size, internal memory, RAM/ROM). Due to the difficulty in handling conventional cryptographic algorithms, lightweight ciphers consist of small key sizes, block sizes and few operational rounds. Unlike in the past, affordability to perform side-channel attacks using inexpensive electronic circuitries is becoming a reality. Hence, cryptanalysis of physical leakage in these emerging ciphers is crucial. Among existing studies, power analysis seems to have enough attention in research, whereas other aspects such as electromagnetic, timing, cache and optical attacks continue to be appropriately evaluated to play a role in forensic analysis. As a result, we started analysing electromagnetic emission leakage of an ultra-lightweight block cipher, PRESENT. According to the literature, PRESENT promises to be adequate for IoT devices, and there still seems not to exist any work regarding correlation electromagnetic analysis (CEMA) of it. Firstly, we conducted simple electromagnetic analysis in both time and frequency domains and then proceeded towards CEMA attack modelling. This paper provides a summary of the related literature (IoT, lightweight cryptography, side-channel attacks and EMA), our methodology, current outcomes and future plans for the optimised results.
翻译:因此,不断观测物理渗漏对于最大限度地减少与加密功能有关的脆弱性至关重要。轻量级加密是迈向互联网安全的新办法。因此,在这种受限制的生态系统中,它将提供足够的数据和隐私保护。在数据率( kbps ) 、 电源维护( 电池) 以及硬件和软件足迹( 物理规模、 内部记忆、 RAM/ ROM) 方面,对物理渗漏进行持续观测至关重要。 由于在处理常规加密算法方面困难重重,轻量级加密由小关键大小、 区块大小和几轮操作组成。 与过去不同, 使用廉价电子电路进行侧通道袭击的可承受性正在成为现实。 因此, 这些新兴密码的对物理渗漏的加密分析至关重要。 在现有的研究中, 电力分析似乎有足够的关注, 其它方面, 如电磁、 时间、 存储器和光学攻击, 继续得到适当的评估, 从而在法医攻击中扮演一个小关键部分, 我们开始分析电磁路路路路路段,, 我们开始对当前进行适当的数据分析。