Reading: Breaking Speck cryptosystem using correlation power analysis attack

Download

A- A+
dyslexia friendly

Research Articles

Breaking Speck cryptosystem using correlation power analysis attack

Authors:

Hasindu Gamaarachchi ,

Department of Computer Engineering, Faculty of Engineering, University of Peradeniya, Peradeniya., LK
X close

Harsha Ganegoda,

Department of Computer Engineering, Faculty of Engineering, University of Peradeniya, Peradeniya., LK
X close

Roshan Ragel

Department of Computer Engineering, Faculty of Engineering, University of Peradeniya, Peradeniya., LK
X close

Abstract

This is an empirical study based on correlation power analysis for extracting the secret key from a Speck based embedded cryptosystem. Speck was recently introduced by the National Security Agency, USA as a lightweight softwarebased block cipher targetting embedded systems. The pervasive nature of embedded devices makes it crucial to perform this assessment. We empirically show that the secret key of a Speck cryptosystem can be extracted within an hour on a microcontroller based embedded system. The experiments were performed in three different microcontrollers with different bit widths and power settings. It is concluded that although Speck is new, it is vulnerable to power analysis attack. 

How to Cite: Gamaarachchi, H., Ganegoda, H. & Ragel, R., (2017). Breaking Speck cryptosystem using correlation power analysis attack. Journal of the National Science Foundation of Sri Lanka. 45(4), pp.393–404. DOI: http://doi.org/10.4038/jnsfsr.v45i4.8233
Published on 27 Dec 2017.
Peer Reviewed

Downloads

  • PDF (EN)

    comments powered by Disqus