@article { author = {Safaei Pour, M. and Salmasizadeh, M.}, title = {A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study}, journal = {The ISC International Journal of Information Security}, volume = {9}, number = {2}, pages = {119-130}, year = {2017}, publisher = {Iranian Society of Cryptology}, issn = {2008-2045}, eissn = {2008-3076}, doi = {10.22042/isecure.2017.82990.376}, abstract = {In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON features. Our new method includes only AND equivalent and XOR equivalent operations since every cryptographic algorithm can be implemented with two basic operations, namely AND and XOR. Therefore, hamming weight and hamming distance take constant values at each moment of time. This can decrease data-dependency between processed values and consumed power. In order to practically evaluate the resulting implementation overheads and the resistance improvement against CPA, we implement the proposed coding scheme on SIMON, a lightweight block cipher, on a smart card with the ATmega163 microprocessor. We define resistance as the number of traces, which for less than that number; the correct key cannot be distinguished from all other hypothetical keys by its correlation coefficient in any moment of time. The results of this implementation show 350 times more immunity against correlation attacks.}, keywords = {Side Channel Attack,DPA,Software Countermeasure,Smoothing Power}, url = {https://www.isecure-journal.com/article_49117.html}, eprint = {https://www.isecure-journal.com/article_49117_fb5fd96d078d298bd2d052f2e0335e0c.pdf} }