2018
DOI: 10.5121/ijcnc.2018.10406
|View full text |Cite
|
Sign up to set email alerts
|

A Security Analysis of IoT Encryption : Side Channel Cube Attack on SIMECK32/64

Abstract: Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube attack. We exhibit our attack against Simeck32/64 using the Hamming weight leakage assumption to extract linearly independent equations in key bits. We have been able to find 32 linearly independent equations in 32 key variables by only considering the second bit f… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Dinur and Shamir [34] introduced the concept of a side-channel cube attack in which the adversary is assumed to have access to only one bit of information about the internal state instead of the ciphertext bits. For detailed information on side-channel cube attacks and their applications, refer to [35][36][37][38][39][40][41].…”
Section: Channel Cube Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Dinur and Shamir [34] introduced the concept of a side-channel cube attack in which the adversary is assumed to have access to only one bit of information about the internal state instead of the ciphertext bits. For detailed information on side-channel cube attacks and their applications, refer to [35][36][37][38][39][40][41].…”
Section: Channel Cube Attackmentioning
confidence: 99%
“…Side-channel attacks using Hamming weight leakage have been investigated in various studies [18,42,43]. Dinur and Shamir [34] proposed reading the second Hamming weight bit from the least significant bit (LSB), which can also be found in several other works, such as in [35,37,44]. In other related work, Zhao and others [40] proposed a practical method to measure the Hamming weight leakage from a cipher implementation on an 8-bit microcontroller.…”
Section: Channel Cube Attackmentioning
confidence: 99%