Since Internet of Things (IoT) devices, such as sensor device or automotive equipment, become widespread, the security of IoT devises is very important. These IoT devices have constraints on the area and the power consumption. Therefore, lightweight block ciphers which have small area and low power have attracted attention. PRESENT is one of the most popular lightweight block ciphers. Regarding the hardware security, the risk of electromagnetic analysis for a cryptographic circuit is pointed out. Differential electromagnetic analysis (DEMA) is typical electromagnetic analysis method. Regarding the verification of tamper resistance, previous studies show difference of selection function in DEMA affects the tamper resistance greatly. Therefore, this study proposes an electromagnetic analysis for PRESENT. The proposed method performs an analysis based on DEMA. Moreover, this study verifies the tamper resistance of PRESENT against DEMA using several selection functions. Experiments using a field programmable gate array show the vulnerability of PRESENT and the validity of the proposed method.
Since Internet of Things (IoT) has been widely used, embedded devices have the risk of illegal attacks. Therefore, lightweight block ciphers, which can be implemented on embedded devices in small area, have attracted attention as the countermeasure. Simeck is a new lightweight block cipher that can be implemented in the smallest area among lightweight block ciphers. Recently, regarding the security of a cryptographic circuit, the risk of electromagnetic analysis attack has been reported. However, no study of electromagnetic analysis attack for Simeck has been reported. Therefore, this study proposes a new electromagnetic analysis attack for a lightweight block cipher Simeck. The proposed method performs the analysis using double rounds. Moreover, the proposed method performs build-in processing using already known information and realizes the high attack accuracy. To our knowledge, this is the first attack for Simeck. Experiments using an actual device introduce the vulnerability of Simeck and the validity of the proposed method. C⃝
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.