The research of DPA attacks against AES implementations

被引:0
|
作者
Department of Electronic Science and Technology, Huazhong University of Science and Technology, Wuhan, 430074, China [1 ]
机构
来源
J. China Univ. Post Telecom. | 2008年 / 4卷 / 101-106期
关键词
Hamming distance;
D O I
10.1016/S1005-8885(08)60412-4
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
This article examines vulnerabilities to power analysis attacks between software and hardware implementations of cryptographic algorithms. Representative platforms including an Atmel 89S8252 8-bit processor and a 0.25 μm 1.8 v standard cell circuit are proposed to implement the advance encryption standard (AES). A simulation-based experimental environment is built to acquire power data, and single-bit differential power analysis (DPA), and multi-bit DPA and correlation power analysis (CPA) attacks are conducted on two implementations respectively. The experimental results show that the hardware implementation has less data-dependent power leakages to resist power attacks. Furthermore, an improved DPA approach is proposed. It adopts hamming distance of intermediate results as power model and arranges plaintext inputs to differentiate power traces to the maximal probability. Compared with the original power attacks, our improved DPA performs a successful attack on AES hardware implementations with acceptable power measurements and fewer computations. © 2008 The Journal of China Universities of Posts and Telecommunications.
引用
收藏
相关论文
共 50 条
  • [21] The effectiveness of a current flattening circuit as countermeasure against DPA attacks
    Vahedi, Haleh
    Gregori, Stefano
    Muresan, Radu
    MICROELECTRONICS JOURNAL, 2011, 42 (01) : 180 - 187
  • [22] Multi-rounds masking method against DPA attacks
    Yoshikawa, M.
    Sugiyama, M.
    2011 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2011, : 100 - 103
  • [23] Practical second-order DPA attacks for masked smart card implementations of block ciphers
    Oswald, E
    Mangard, S
    Herbst, C
    Tillich, S
    TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 192 - 207
  • [24] Security evaluation of dual rail logic against DPA attacks
    Razafindraibe, A.
    Maurine, P.
    Robert, M.
    Renaudin, M.
    IFIP VLSI-SOC 2006: IFIP WG 10.5 INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION & SYSTEM-ON-CHIP, 2006, : 181 - +
  • [25] SEED Masking Implementations against Power Analysis Attacks
    Lu, Y.
    Boey, K-H
    Hodgers, P.
    O'Neill, M.
    PROCEEDINGS OF THE 2010 IEEE ASIA PACIFIC CONFERENCE ON CIRCUIT AND SYSTEM (APCCAS), 2010, : 1199 - 1202
  • [26] Power analysis attacks against FPGA implementations of the DES
    Standaert, FX
    Örs, SB
    Quisquater, JJ
    Preneel, B
    FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2004, 3203 : 84 - 94
  • [27] Collision-Based Attacks on White-Box Implementations of the AES Block Cipher
    Lu, Jiqiang
    Wang, Mingxue
    Wang, Can
    Yang, Chen
    SELECTED AREAS IN CRYPTOGRAPHY, SAC 2022, 2024, 13742 : 328 - 352
  • [28] A Systematic Evaluation of EM and Power Side-Channel Analysis Attacks on AES Implementations
    Iyer, Vishnuvardhan
    Wang, Meizhi
    Kulkarni, Jaydeep
    Yilmaz, Ali E.
    2021 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2021, : 46 - 51
  • [29] Fault-Injection Based Chosen-Plaintext Attacks on Multicycle AES Implementations
    Zhong, Yadi
    Guin, Ujjwal
    PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 443 - 448
  • [30] Correlation Photonic Emission Attacks Against AES Algorithm
    Wang, Hong-sheng
    Xu, Zi-yan
    Zhang, Yang
    Chen, Kai-yan
    Wu, Ling-an
    PROCEEDINGS OF THE 2016 5TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS AND COMPUTER SCIENCE, 2016, 80 : 512 - 517