{"title":"Tamper Resistance Evaluation of TWINE Implemented on 8-bit Microcontroller","authors":"Y. Nozaki, M. Yoshikawa","doi":"10.1145/3378936.3378980","DOIUrl":null,"url":null,"abstract":"Lightweight ciphers, which can be used in limited resources of internet of things devices, have been attracted attention in recent years. In particular, TWINE has good performances in software implementation of a small embedded device. Even though encryption algorithm is computationally secured, the threat of power analysis which can easily estimate a secret key stored into a cryptographic circuit is pointed out. This study proposes a power analysis method for a lightweight cipher TWINE of software implementation to evaluate the tamper resistance (security evaluation). The proposed method introduces two attack points which are obtained by an analysis of assembly code of TWINE round function. Evaluation experiments use an AVR 8-bit microcontroller Atmega328P mounted on Arduino-UNO. These experiments revealed the vulnerability of TWINE software implementation against the proposed power analysis method.","PeriodicalId":304149,"journal":{"name":"Proceedings of the 3rd International Conference on Software Engineering and Information Management","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 3rd International Conference on Software Engineering and Information Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3378936.3378980","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Lightweight ciphers, which can be used in limited resources of internet of things devices, have been attracted attention in recent years. In particular, TWINE has good performances in software implementation of a small embedded device. Even though encryption algorithm is computationally secured, the threat of power analysis which can easily estimate a secret key stored into a cryptographic circuit is pointed out. This study proposes a power analysis method for a lightweight cipher TWINE of software implementation to evaluate the tamper resistance (security evaluation). The proposed method introduces two attack points which are obtained by an analysis of assembly code of TWINE round function. Evaluation experiments use an AVR 8-bit microcontroller Atmega328P mounted on Arduino-UNO. These experiments revealed the vulnerability of TWINE software implementation against the proposed power analysis method.