Practical power analysis on KCipher-2 software on low-end microcontrollers

Wataru Kawai, Rei Ueno, Naofumi Homma, Takafumi Aoki, Kazuhide Fukushima, Shinsaku Kiyomoto

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

In this paper, we present a practical power-analysisbased attack on KCipher-2 software implemented on microcontrollers. The key idea of the proposed attack is to exploit aspecific Hamming weight (HW) leakage from low-end microcontrollers or to skip a specific part of the software sequence by a fault injection on low-end microcontrollers in addition toa conventional power analysis available for KCipher-2 hardware. The efficiency and validity of the proposed method are demonstrated through experiment on KCipher-2 software implemented on 8-bit AVR and 32-bit ARM microcontrollers. The proposed attack can reveal the entire 128-bit key of KCipher-2 within a realistic computation cost, while the conventionalattack does not. In this paper, we also present a compact countermeasure against the proposed attack on the basis of random masking techniques, which can be implemented on aresource-constrained microcontroller.

Original languageEnglish
Title of host publicationProceedings - 2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages113-121
Number of pages9
ISBN (Electronic)9780769561073
DOIs
Publication statusPublished - 2017 Jun 30
Event2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017 - Paris, France
Duration: 2017 Apr 292017 Apr 30

Publication series

NameProceedings - 2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017

Conference

Conference2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017
Country/TerritoryFrance
CityParis
Period17/4/2917/4/30

Keywords

  • Fault injection attacks
  • KCipher-2 software
  • Masking countermeasures
  • Microcontroller
  • Side-channel attacks
  • Smart card

Fingerprint

Dive into the research topics of 'Practical power analysis on KCipher-2 software on low-end microcontrollers'. Together they form a unique fingerprint.

Cite this