skip to main content
10.1145/3378936.3378980acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicsimConference Proceedingsconference-collections
research-article

Tamper Resistance Evaluation of TWINE Implemented on 8-bit Microcontroller

Published: 07 March 2020 Publication History

Abstract

Lightweight ciphers, which can be used in limited resources of internet of things devices, have been attracted attention in recent years. In particular, TWINE has good performances in software implementation of a small embedded device. Even though encryption algorithm is computationally secured, the threat of power analysis which can easily estimate a secret key stored into a cryptographic circuit is pointed out. This study proposes a power analysis method for a lightweight cipher TWINE of software implementation to evaluate the tamper resistance (security evaluation). The proposed method introduces two attack points which are obtained by an analysis of assembly code of TWINE round function. Evaluation experiments use an AVR 8-bit microcontroller Atmega328P mounted on Arduino-UNO. These experiments revealed the vulnerability of TWINE software implementation against the proposed power analysis method.

References

[1]
Naha, R. K., Garg, S., Georgakopoulos, D., Jayaraman, P. P., Gao, L., Xiang, Y., and Ranjan, R. 2018. Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions. IEEE Access, 6 (Aug. 2018), 47980--48009. DOI= http://doi.org/10.1109/ACCESS.2018.2866491.
[2]
Sicaria, S., Rizzardia, A., Griecob, L. A., and Coen-Porisinia, A. 2015. Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76 (Jan. 2015), 146--164. DOI=https://doi.org/10.1016/j.comnet.2014.11.008.
[3]
National Institute of Standards and Technology. 2001. Specification for the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197. DOI= http://doi.org/10.6028/NIST.FIPS.197
[4]
Suzaki, T., Minematsu, K., Morioka, S., and Kobayashi, E. 2011. TWINE: A Lightweight, Versatile Blockcipher. In Proceedings of ECRYPT Workshop on Lightweight Cryptography (Louvain-la-Neuve, Belgium, November 28-29, 2011). LC11, 146--169.
[5]
Bogdanav, A., Knudsen, L. R., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J. B., Seurin, Y., and Vikkelsoe, C. 2007. PRESENT: An Ultra-Lightweight Block Cipher. In Proceedings of 9th International Workshop on Cryptographic Hardware and Embedded Systems (Vienna, Austria, September 10-13, 2007). CHES 2007. Springer-Verlag LNCS 4727, 450--466. DOI= http://doi.org/10.1007/978-3-540-74735-2_31.
[6]
Yang, G., Zhu, B., Suder, V., Aagaard, M. D., and Gong, G. 2015. The Simeck Family of Lightweight Block Ciphers. In Proceedings of 17th International Workshop on Cryptographic Hardware and Embedded Systems (Saint-Malo, France, September 13-16, 2015). CHES 2015. Springer-Verlag LNCS 9293, 307--329. DOI= http://doi.org/10.1007/978-3-662-48324-4_16.
[7]
Kocher, P., Jaffe, J., and Jun, B. 1999. Differential Power Analysis. In Proceedings of 19th Annual International Cryptology Conference (Santa Barbara, USA, August 15-19, 1999). CRYPTO'99. Springer-Verlag LNCS 1666, 388--397. DOI= http://doi.org/10.1007/3-540-48405-1_25.
[8]
Brier, E., Clavier, C., and Olivier, F. 2004. Correlation Power Analysis with a Leakage Model. In Proceedings of 6th International Workshop on Cryptographic Hardware and Embedded Systems (Boston, USA, August 11-13, 2004). CHES 2004. Springer-Verlag LNCS 3156, 16--29. DOI= http://doi.org/10.1007/978-3-540-28632-5_2.
[9]
Mangard, S., Oswald, E., and Popp, T. 2007. Power Analysis Attacks. Springer. DOI= 10.1007/978-0-387-38162-6.
[10]
Biryukov, A. Dinu, D., and Großschädl, J. 2016. Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice. In Proceedings of 14th International Conference on Applied Cryptography and Network Security (Guildford, UK, June 19--22, 2016). ACNS 2016. Springer LNCS 9696, 537--557. DOI= http://doi.org/10.1007/978-3-319-39555-5_29.
[11]
Nozaki, Y. Asahi, K., and Yoshikawa, M. 2015. Countermeasure of TWINE against power analysis attack. In Proceedings of IEEE International Meeting for Future of Electron Devices, Kansai (Kyoto, Japan, June 4-5, 2015). IMFEDK 2015. IEEE. 68--69. DOI= http://doi.org/10.1109/IMFEDK.2015.7158553.
[12]
Yoshikawa, M., Nozaki, Y., and Asahi, K. 2016. Electromagnetic analysis attack for a lightweight block cipher TWINE. In Proceedings of 2016 IEEE/ACES International Conference on Wireless Information Technology and Systems and Applied Computational Electromagnetics (Honolulu, USA, March 3-18, 2016). ICWITS and ACES. IEEE. 1--2. DOI= http://doi.org/10.1109/ROPACES.2016.7465354.
[13]
Nozaki, Y. and Yoshikawa, M. 2018. Tamper Resistance Evaluation Method for Energy Harvester. In Proceedings of 3rd International Conference on Computational Intelligence and Applications (Hong Kong, July 28-30, 2018). ICCIA 2018. IEEE. 200--204. DOI= http://doi.org/10.1109/ICCIA.2018.00045.
[14]
Gandolfi, K., Mourtel, C., Olivier, F. 2001. Electromagnetic analysis: concrete results. In Proceedings of 3rd International Workshop on Cryptographic Hardware and Embedded Systems (Paris, France, May 14-16, 2001). CHES 2001. Springer-Verlag LNCS 2162, 251--261. DOI= https://doi.org/10.1007/3-540-44709-1_21.
[15]
Meynard, O., Guilley, S., Danger, J.-L., and Sauvage, L. 2010. Far Correlation-based EMA with a Precharacterized Leakage Model, In Proceedings of Design, Automation and Test in Europe Conf. and Exhibition (Dresden, Germany, March 8--12, 2010), DATE 2010, IEEE. 977--980. DOI= http://doi.org/10.1109/DATE.2010.5456906.

Cited By

View all
  • (2020)Energy Harvesting towards Self-Powered IoT DevicesEnergies10.3390/en1321552813:21(5528)Online publication date: 22-Oct-2020

Index Terms

  1. Tamper Resistance Evaluation of TWINE Implemented on 8-bit Microcontroller

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICSIM '20: Proceedings of the 3rd International Conference on Software Engineering and Information Management
    January 2020
    258 pages
    ISBN:9781450376907
    DOI:10.1145/3378936
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • University of Science and Technology of China: University of Science and Technology of China

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 March 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. 8-bit microcontroller
    2. Hardware security
    3. Lightweight cipher
    4. Side-channel analysis
    5. Software implementation
    6. TWINE

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICSIM '20

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)Energy Harvesting towards Self-Powered IoT DevicesEnergies10.3390/en1321552813:21(5528)Online publication date: 22-Oct-2020

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media