Paper 2017/248
IPcore implementation susceptibility: A case study of Low latency ciphers
Dillibabu Shanmugam, Ravikumar Selvam, and Suganya Annadurai
Abstract
Security evaluation of third-party cryptographic IP (Intellectual Property) cores is often ignored due to several reasons including, lack of awareness about its adversity, lack of trust validation methodology otherwise view security as a byproduct. Particularly, the validation of low latency cipher IP core on Internet of Things (IoT) devices is crucial as they may otherwise become vulnerable for information theft. In this paper, we share an (Un)intentional way of cipher implementation as IP core(hard) become susceptible against side channel attack and show how the susceptible implementation can be experimentally exploited to reveal secret key in FPGA using power analysis. In this paper our contributions are: First, we present Look-Up Table (LUT) based unrolled implementation of PRINCE block cipher with place and route constraints in FPGA. Second, using power analysis attack we recover 128-bit key of PRINCE with complexity of 2^9. Finally, we conclude the paper with the experimental results.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Preprint.
- Contact author(s)
- dillibabu @ setsindia net
- History
- 2017-03-20: received
- Short URL
- https://ia.cr/2017/248
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2017/248, author = {Dillibabu Shanmugam and Ravikumar Selvam and Suganya Annadurai}, title = {{IPcore} implementation susceptibility: A case study of Low latency ciphers}, howpublished = {Cryptology {ePrint} Archive, Paper 2017/248}, year = {2017}, url = {https://eprint.iacr.org/2017/248} }