z-logo
Premium
Multiple countermeasures on unrolled architecture PRINCE against power analysis and its evaluation
Author(s) -
Takemoto Shu,
Nozaki Yusuke,
Yoshikawa Masaya
Publication year - 2020
Publication title -
electronics and communications in japan
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.131
H-Index - 13
eISSN - 1942-9541
pISSN - 1942-9533
DOI - 10.1002/ecj.12249
Subject(s) - block cipher , power analysis , computer science , countermeasure , overhead (engineering) , architecture , embedded system , block (permutation group theory) , cipher , masking (illustration) , power (physics) , cryptography , computer security , engineering , encryption , operating system , art , physics , geometry , mathematics , quantum mechanics , visual arts , aerospace engineering
Lightweight block ciphers, which can be implemented with low cost, are suitable for improving the safety of small devices. PRINCE is a typical lightweight block cipher and suitable for unrolled architecture implementation. In addition, PRINCE can be achieved low latency and embedded in a small area. However, it has been reported that PRINCE with unrolled architecture implementation is vulnerable to power analysis. Regarding countermeasure against power analysis, the threshold implementation and rotating S‐boxes masking are popular countermeasures, these require large implementation overhead though. Therefore, this study proposes a low‐overhead power analysis countermeasure method for PRINCE with unrolled architecture. Moreover, evaluation experiments using a field‐programmable gate array verify the effectiveness of the proposed method. In experiments, the proposed method improved tamper resistance and reduced implementation overhead in comparison with the conventional method.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here