Suggestion of CPA Attack and Countermeasure for Super-Light Block Cryptographic CHAM


KIPS Transactions on Computer and Communication Systems, Vol. 9, No. 5, pp. 107-112, May. 2020
https://doi.org/10.3745/KTCCS.2020.9.5.107,   PDF Download:
Keywords: Side Channel Attack, CHAM, CPA Attack, Masking, AVR
Abstract

Ultra-lightweight password CHAM is an algorithm with efficient addition, rotation and XOR operations on resource constrained devices. CHAM shows high computational performance, especially on IoT platforms. However, lightweight block encryption algorithms used on the Internet of Things may be vulnerable to side channel analysis. In this paper, we demonstrate the vulnerability to side channel attack by attempting a first power analysis attack against CHAM. In addition, a safe algorithm was proposed and implemented by applying a masking technique to safely defend the attack. This implementation implements an efficient and secure CHAM block cipher using the instruction set of an 8-bit AVR processor.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
H. Kim, K. Kim, H. Kwon, H. Seo, "Suggestion of CPA Attack and Countermeasure for Super-Light Block Cryptographic CHAM," KIPS Transactions on Computer and Communication Systems, vol. 9, no. 5, pp. 107-112, 2020. DOI: https://doi.org/10.3745/KTCCS.2020.9.5.107.

[ACM Style]
Hyun-Jun Kim, Kyung-Ho Kim, Hyeok-Dong Kwon, and Hwa-Jeong Seo. 2020. Suggestion of CPA Attack and Countermeasure for Super-Light Block Cryptographic CHAM. KIPS Transactions on Computer and Communication Systems, 9, 5, (2020), 107-112. DOI: https://doi.org/10.3745/KTCCS.2020.9.5.107.