Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices

David A J McCann, Kerstin I Eder, M Elisabeth Oswald

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

7 Citations (Scopus)
325 Downloads (Pure)

Abstract

This paper uses an Instruction Set Architecture(ISA) based statistical energy model of an ARM Cortex-M4microprocessor to evaluate the energy consumption of an implementation of AES with different side channel attack (SCA) countermeasures and an implementation of lightweight ciphers PRESENT, KLEIN and ZORRO with and without Boolean first order masking. In this way, we assess the additional energy consumption of using different SCA countermeasures and using lightweight block ciphers on 32 bit embedded devices. In addition to this, we provide a methodology for developing an ISA based energy model for cryptographic software with an accuracy of +/-5%. In addition to providing our methodology for developing this model, we also show that using variations of instructions that reduce the size of code can reduce the energy consumption by as much as 30% +/- 40% and that memory instructions reduce the predictability of our energy model.
Original languageEnglish
Title of host publicationProceedings of 2015 International Workshop on Secure Internet of Things (SIoT)
Subtitle of host publicationProceedings of a meeting held 21-25 September 2015 at Vienna, Austria
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages65-71
Number of pages7
ISBN (Electronic)9781467377690
ISBN (Print)9781467377706
DOIs
Publication statusPublished - Mar 2016
Event2015 International Workshop on Secure Internet of Things (SIoT) - Vienna, Austria
Duration: 21 Sep 201525 Sep 2015

Workshop

Workshop2015 International Workshop on Secure Internet of Things (SIoT)
CountryAustria
CityVienna
Period21/09/1525/09/15

Keywords

  • cryptography
  • energy
  • side channel
  • lightweight
  • IoT

Fingerprint Dive into the research topics of 'Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices'. Together they form a unique fingerprint.

Cite this