Dimming Down LED: An Open-source Threshold Implementation on Light Encryption Device (LED) Block Cipher

08/27/2021
by   Yuan Yao, et al.
0

Lightweight block ciphers have been widely used in applications such as RFID tags, IoTs, and network sensors. Among them, with comparable parameters, the Light Encryption Device (LED) block cipher achieves the smallest area. However, implementation of encryption algorithms manifest side-channel leakage, therefore, it is crucial to protect their design against side-channel analyses. In this paper, we present a threshold implementation of the LED cipher which has 64-bit data input and 128-bit key. The presented design splits secret information among multiple shares to achieve a higher security level. We demonstrate that our implementation can protect against first-order power side-channel attacks. As a cost, the design area is almost doubled and the maximum operating frequency is degraded by 30 we have also open-sourced our design online.

READ FULL TEXT

page 3

page 4

research
12/11/2019

Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers

Since their introduction over two decades ago, physical side-channel att...
research
08/10/2018

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64

Simeck, a lightweight block cipher has been proposed to be one of the en...
research
03/08/2021

Design and implementation of Energy Efficient Lightweight Encryption (EELWE) algorithm for medical applications

Proportional to the growth in the usage of Human Sensor Networks (HSN), ...
research
11/09/2017

Exfiltration of Data from Air-gapped Networks via Unmodulated LED Status Indicators

The light-emitting diode(LED) is widely used as an indicator on the info...
research
02/25/2023

Secure End-to-End Communications with Lightweight Cryptographic Algorithm

The field of lightweight cryptography has been gaining popularity as tra...
research
01/27/2022

Strong Converse Theorem for Source Encryption under Side-Channel Attacks

We are interested in investigating the security of source encryption wit...
research
07/13/2023

Information Leakage from Optical Emanations

A previously unknown form of compromising emanations has been discovered...

Please sign up or login with your details

Forgot password? Click here to reset