Paper 2017/248

IPcore implementation susceptibility: A case study of Low latency ciphers

Dillibabu Shanmugam, Ravikumar Selvam, and Suganya Annadurai

Abstract

Security evaluation of third-party cryptographic IP (Intellectual Property) cores is often ignored due to several reasons including, lack of awareness about its adversity, lack of trust validation methodology otherwise view security as a byproduct. Particularly, the validation of low latency cipher IP core on Internet of Things (IoT) devices is crucial as they may otherwise become vulnerable for information theft. In this paper, we share an (Un)intentional way of cipher implementation as IP core(hard) become susceptible against side channel attack and show how the susceptible implementation can be experimentally exploited to reveal secret key in FPGA using power analysis. In this paper our contributions are: First, we present Look-Up Table (LUT) based unrolled implementation of PRINCE block cipher with place and route constraints in FPGA. Second, using power analysis attack we recover 128-bit key of PRINCE with complexity of 2^9. Finally, we conclude the paper with the experimental results.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint.
Contact author(s)
dillibabu @ setsindia net
History
2017-03-20: received
Short URL
https://ia.cr/2017/248
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2017/248,
      author = {Dillibabu Shanmugam and Ravikumar Selvam and Suganya Annadurai},
      title = {IPcore implementation susceptibility: A case study of Low latency ciphers},
      howpublished = {Cryptology ePrint Archive, Paper 2017/248},
      year = {2017},
      note = {\url{https://eprint.iacr.org/2017/248}},
      url = {https://eprint.iacr.org/2017/248}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.