A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64.
Alya Geogiana BujaShekh Faisal Abdul-LatipRabiah AhmadPublished in: CoRR (2018)
Keyphrases
- security analysis
- secret key
- smart card
- encryption algorithm
- encryption scheme
- power analysis
- public key
- key management
- authentication protocol
- security properties
- countermeasures
- key exchange
- high security
- ciphertext
- image encryption
- digital signature
- secure communication
- elliptic curve cryptography
- standard model
- security requirements
- mutual authentication
- pseudorandom
- security model
- authentication scheme
- information security
- public key cryptography
- user authentication
- diffie hellman
- block cipher
- intrusion detection
- cloud computing
- key distribution
- signature scheme