Two-Step Power Analysis Method for a Lightweight Authenticated Encryption TWINE-OTR and Its Evaluation

Yusuke NOZAKI  Masaya YOSHIKAWA  

Publication
D - Abstracts of IEICE TRANSACTIONS on Information and Systems (Japanese Edition)   Vol.J101-D   No.3   pp.512-521
Publication Date: 2018/03/01
Online ISSN: 1881-0225
DOI: 
Type of Manuscript: Special Section PAPER (Special Section on Student Research)
Category: 
Keyword: 
power analysis,  cryptographic circuit,  hardware security,  side-channel attack,  tamper resistance,  

Full Text(in Japanese): PDF(2.3MB)
>>Buy this Article


Summary: 
Recently, TWINE-OTR, which combines a lightweight block cipher TWINE and an authenticated encryption OTR, has been attracted attention as the security countermeasures for IoT devices. On the other hand, the risk of power analysis is pointed out. However, few studies of power analysis for TWINE-OTR have been reported. Therefore, this study proposes a new power analysis method for TWINE-OTR. The proposed method performs the Two-Step power analysis to analyze the secret key. Experiments using a field programmable gate array prove the validity of the proposed method and verify the tamper resistance of TWINE-OTR.