The research of DPA attacks against AES implementations

被引:0
|
作者
Department of Electronic Science and Technology, Huazhong University of Science and Technology, Wuhan, 430074, China [1 ]
机构
来源
J. China Univ. Post Telecom. | 2008年 / 4卷 / 101-106期
关键词
Hamming distance;
D O I
10.1016/S1005-8885(08)60412-4
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
This article examines vulnerabilities to power analysis attacks between software and hardware implementations of cryptographic algorithms. Representative platforms including an Atmel 89S8252 8-bit processor and a 0.25 μm 1.8 v standard cell circuit are proposed to implement the advance encryption standard (AES). A simulation-based experimental environment is built to acquire power data, and single-bit differential power analysis (DPA), and multi-bit DPA and correlation power analysis (CPA) attacks are conducted on two implementations respectively. The experimental results show that the hardware implementation has less data-dependent power leakages to resist power attacks. Furthermore, an improved DPA approach is proposed. It adopts hamming distance of intermediate results as power model and arranges plaintext inputs to differentiate power traces to the maximal probability. Compared with the original power attacks, our improved DPA performs a successful attack on AES hardware implementations with acceptable power measurements and fewer computations. © 2008 The Journal of China Universities of Posts and Telecommunications.
引用
收藏
相关论文
共 50 条
  • [2] A Security Comparison between AES-128 and AES-256 FPGA implementations against DPA attacks
    Zuniga Gonzalez, Virginia
    Tena-Sanchez, Erica
    Acosta, Antonio J.
    2023 38TH CONFERENCE ON DESIGN OF CIRCUITS AND INTEGRATED SYSTEMS, DCIS, 2023,
  • [3] Strengthening hardware AES implementations against fault attacks
    Joye, M.
    Manet, P.
    Rigaud, J. -B.
    IET INFORMATION SECURITY, 2007, 1 (03) : 106 - 110
  • [4] Hardening AES Hardware Implementations Against Fault and Error Inject Attacks
    Bu, Lake
    Kinsy, Michel A.
    PROCEEDINGS OF THE 2018 GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI'18), 2018, : 499 - 502
  • [5] Invariant of Enhanced AES Algorithm Implementations Against Power Analysis Attacks
    Ansari, Nadia Mustaqim
    Hussain, Rashid
    Arif, Sheeraz
    Hussain, Syed Sajjad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 1861 - 1875
  • [6] A Voltage Regulator-Assisted Lightweight AES Implementation Against DPA Attacks
    Yu, Weize
    Kose, Selcuk
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2016, 63 (08) : 1152 - 1163
  • [7] Protection against DPA and related attacks
    Kocher, Paul
    ELECTRONICS WORLD, 2008, 114 (1863): : 32 - 36
  • [8] Security Evaluation of Different AES Implementations Against Practical Setup Time Violation Attacks in FPGAs
    Bhasin, Shivam
    Selmane, Nidhal
    Guilley, Sylvain
    Danger, Jean-Luc
    2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, : 15 - 21
  • [9] Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations
    Gallais, Jean-Francois
    Kizhvatov, Ilya
    Tunstall, Michael
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 243 - +
  • [10] Efficient collision attacks on smart card implementations of masked AES
    WANG An
    WANG ZongYue
    ZHENG XueXin
    WANG XiaoMei
    CHEN Man
    ZHANG GuoShuang
    WU LiJi
    ScienceChina(InformationSciences), 2015, 58 (05) : 97 - 111