Abstract
The expansion of the Internet of Things (IoT) raises the concern of security measures on resource-constrained devices susceptible to side-channel attacks (SCA). In 2016, The National Institute for Standard and Technology (NIST) initiated a process to solicit, evaluate, and standardize lightweight cryptographic algorithms suitable for use in resource-constrained devices, where the performance of current NIST cryptographic standards is not acceptable. This work investigates side-channel vulnerabilities of masked and unmasked versions of Schwaemm and GIFT, two of the ten lightweight cryptographic algorithms selected by NIST as finalists. To test the resilience of Schwaemm and GIFT against side-channel attacks, we apply Correlation Power Analysis (CPA) and Deep Learning Power Analysis (DLPA) to their hardware implementations.
Original language | American English |
---|---|
State | Published - 12 Jul 2022 |