For Full-Text PDF, please login, if you are a member of IEICE,|
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
Two-Step Power Analysis Method for a Lightweight Authenticated Encryption TWINE-OTR and Its Evaluation
Yusuke NOZAKI Masaya YOSHIKAWA
D - Abstracts of IEICE TRANSACTIONS on Information and Systems (Japanese Edition)
Publication Date: 2018/03/01
Online ISSN: 1881-0225
Type of Manuscript: Special Section PAPER (Special Section on Student Research)
power analysis, cryptographic circuit, hardware security, side-channel attack, tamper resistance,
Full Text(in Japanese): PDF(2.3MB)
>>Buy this Article
Recently, TWINE-OTR, which combines a lightweight block cipher TWINE and an authenticated encryption OTR, has been attracted attention as the security countermeasures for IoT devices. On the other hand, the risk of power analysis is pointed out. However, few studies of power analysis for TWINE-OTR have been reported. Therefore, this study proposes a new power analysis method for TWINE-OTR. The proposed method performs the Two-Step power analysis to analyze the secret key. Experiments using a field programmable gate array prove the validity of the proposed method and verify the tamper resistance of TWINE-OTR.