Consideration of the side-channel attack to SPECK implemented on Arduino Uno

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this study, we examined a type of side-channel attack, the Correlation Power Analysis (CPA) attack, which analyzes the correct key of the cipher by calculating the correlation between power consumption and intermediate data. The authors also examined side-channel attacks using various attack techniques. The authors found that light-weight cipher SPECK may not resist side-channel attacks because it requires too few resources for a successful attack. Furthermore, the authors investigated the minimum number of plain texts needed for attacking. As a result, it was found that 50 plain texts are sufficient for a successful attack.

Original languageEnglish
Title of host publicationProceedings - 2021 9th International Symposium on Computing and Networking Workshops, CANDARW 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages339-345
Number of pages7
ISBN (Electronic)9781665428354
DOIs
Publication statusPublished - 2021
Event9th International Symposium on Computing and Networking Workshops, CANDARW 2021 - Virtual, Online, Japan
Duration: Nov 23 2021Nov 26 2021

Publication series

NameProceedings - 2021 9th International Symposium on Computing and Networking Workshops, CANDARW 2021

Conference

Conference9th International Symposium on Computing and Networking Workshops, CANDARW 2021
Country/TerritoryJapan
CityVirtual, Online
Period11/23/2111/26/21

Keywords

  • information security
  • lightweight cipher
  • side-channel attack
  • SPECK

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Information Systems
  • Software

Fingerprint

Dive into the research topics of 'Consideration of the side-channel attack to SPECK implemented on Arduino Uno'. Together they form a unique fingerprint.

Cite this