Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Correlation Power Analysis Attack to Midori-64

Version 1 : Received: 29 July 2022 / Approved: 4 August 2022 / Online: 4 August 2022 (03:50:00 CEST)

How to cite: Khadem, B.; Ghanbari, H.; Moradnia, M. Correlation Power Analysis Attack to Midori-64. Preprints 2022, 2022080096. https://doi.org/10.20944/preprints202208.0096.v1 Khadem, B.; Ghanbari, H.; Moradnia, M. Correlation Power Analysis Attack to Midori-64. Preprints 2022, 2022080096. https://doi.org/10.20944/preprints202208.0096.v1

Abstract

Recently, with the rapid advancement of technology, Internet of Things (IoT‏‏‏‏) security has become more efficient and more complex, especially for resource-limited devices such as embedded devices, wireless sensors and radio frequency identification tags (RFID). Lightweight block ciphers (LBCs) provide security for these technologies to protect them against adversaries, but the need for low power consumption in LBCs is one of the most important challenges for IoT‏ technologies. Furthermore, these LBCs are subject to multiple attacks and side channel attacks (SCAs) are among the mentioned threats to these cryptosystems. A type of SCA is correlation power analysis (CPA) in which the attacker tries to reach the key using the relationship between the power consumption of the chip during the algorithm running, data processing, and operations. In this article, a CPA attack is designed to discover master key of the Midori-64 block cipher. According to the proposed method, an attack is done to the first round S-boxes to get half of the key bits. Then, the second round S-boxes were attacked to other half of key bits just use 300 plain text samples. Finally, the most important physical attacks performed on the Midori, are compared to our proposed CPA attack.

Keywords

IOT security; Lightweight cryptography; CPA attack; Midori block cipher

Subject

Engineering, Electrical and Electronic Engineering

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.