4 research outputs found

    Electromagnetic Side-Channel Resilience against Lightweight Cryptography

    Get PDF
    Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, observations of leakages through physical parameters, i.e., power and electromagnetic (EM) radiation, etc., of digital devices are essential to minimise vulnerabilities associated with cryptographic functions. Compared to costs in the past, performing side-channel attacks using inexpensive test equipment is becoming a reality. Internet-of-Things (IoT) devices are resource-constrained, and lightweight cryptography is a novel approach in progress towards IoT security. Thus, it would provide sufficient data and privacy protection in such a constrained ecosystem. Therefore, cryptanalysis of physical leakages regarding these emerging ciphers is crucial. EM side-channel attacks seem to cause a significant impact on digital forensics nowadays. Within existing literature, power analysis seems to have considerable attention in research whereas other phenomena, such as EM, should continue to be appropriately evaluated in playing a role in forensic analysis.The emphasis of this thesis is on lightweight cryptanalysis. The preliminary investigations showed no Correlation EManalysis (CEMA) of PRESENT lightweight algorithm. The PRESENT is a block cipher that promises to be adequate for IoT devices, and is expected to be used commercially in the future. In an effort to fill in this research gap, this work examines the capabilities of a correlation EM side-channel attack against the PRESENT. For that, Substitution box (S-box) of the PRESENT was targeted for its 1st round with the use of a minimum number of EM waveforms compared to other work in literature, which was 256. The attack indicates the possibility of retrieving 8 bytes of the secret key out of 10 bytes. The experimental process started from a Simple EMA (SEMA) and gradually enhanced up to a CEMA. The thesis presents the methodology of the attack modelling and the observations followed by a critical analysis. Also, a technical review of the IoT technology and a comprehensive literature review on lightweight cryptology are included

    Don't walk like an Egyptian : Coping with shared attention in a mobile 3D system

    Get PDF
    This thesis presents our study of a system using real-time three-dimensional graphics on handheld computers focusing on the impact of the shared attention problem. The main objective is to investigate whether a mobile RT3D system can be both usable and useful. We postulate that one of the greater challenges to such a system is the problem of shared attention. The dynamic context of truly mobile IT use means that the user will have to share his attention between operating the system and relating to the world around him. In order to investigate this issue we developed a prototype of a Mobile 3D system. We relied on literature studies, interviews with experts and other research of relevance. As a result we formulated a set of system requirements with the intention to cope with the shared attention problem. We then performed an experiment to test how the mobile 3D system developed was utilized and how our design choices affected shared attention among the test subjects. The resulting system was received favourably by the test subjects. We observed the subjects obtaining a dynamic pattern of use where they located the destination of each task prior to movement, then checked while moving that they were on the right track. The attention demand of the system was not observed to be intrusive as the subjects appeared to be able to make efficient use of the system while moving. Although the system was received favourably by the test subjects, we suspect that our initial suppositions need to be revised. Our finds indicate that our focus on shared attention may have blinded us to other important factors. There were indications that the subjects had constructed a mental map of the geographical area prior to beginning movement and so did not use the system to aqcuire new information while they were walking. This interpretation leads to several needed revisions of our shared attention model. In our discussion we argue that focusing our design on shared attention to such an extent is not necessarily ideal for M3D systems. However the start/stop paradigm of the subjects indicates the need for a dynamic interaction design: aimed at rapidly switching between high and low attention modes

    COZMO - A new lightweight stream cipher

    No full text
    corecore