TUM Logo

Quiet Keys for Lightweight Block Ciphers

In the paper [1] published by Mizuki und Hayashi in 2014, a method was presented to enable hardware designers to facilitate the evaluation of their products with respect to side channel attacks. They presented a method to find quiet and noisy keys in the last round of AES. With these keys one expects extremely low or respectively high leakage under the assumption that the leakage function follows the hamming-distance-model. Therefore, the security of the cryptographic device and its countermeasures can be tested according to side channel attacks [cf. 1, p.1]. The following thesis picks up this idea and analyses the AES-like lightweight block ciphers PRESENT and PRINCE according to the possibility to search for quiet (and noisy) keys. The steps of this analysis and if computable in the context of this bachelor thesis, the quiet and noisy keys will be presented.

Quiet Keys for Lightweight Block Ciphers

Supervisor(s): Thomas Kittel
Status: finished
Topic: Others
Author: Maria Möbius
Submission: 2015-05-15
Type of Thesis: Bachelorthesis
Proof of Concept No

Astract:

In the paper [1] published by Mizuki und Hayashi in 2014, a method was presented to enable hardware designers to facilitate the evaluation of their products with respect to side channel attacks. They presented a method to find quiet and noisy keys in the last round of AES. With these keys one expects extremely low or respectively high leakage under the assumption that the leakage function follows the hamming-distance-model. Therefore, the security of the cryptographic device and its countermeasures can be tested according to side channel attacks [cf. 1, p.1]. The following thesis picks up this idea and analyses the AES-like lightweight block ciphers PRESENT and PRINCE according to the possibility to search for quiet (and noisy) keys. The steps of this analysis and if computable in the context of this bachelor thesis, the quiet and noisy keys will be presented.