The research of DPA attacks against AES implementations

被引:0
|
作者
HAN Yu
机构
关键词
AES implementation; side-channel leakage; DPA; CPA; power model; power trace;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
This article examines vulnerabilities to power analysis attacks between software and hardware implementations of cryptographic algorithms. Representative platforms including an Atmel 89S8252 8-bit processor and a 0.25 μm 1.8 v standard cell circuit are proposed to implement the advance encryption standard (AES). A simulation-based experimental environment is built to acquire power data, and single-bit differential power analysis (DPA), and multi-bit DPA and correlation power analysis (CPA) attacks are conducted on two implementations respectively. The experimental results show that the hardware implementation has less data-dependent power leakages to resist power attacks. Furthermore, an improved DPA approach is proposed. It adopts hamming distance of intermediate results as power model and arranges plaintext inputs to differentiate power traces to the maximal probability. Compared with the original power attacks, our improved DPA performs a successful attack on AES hardware implementations with acceptable power measurements and fewer computations.
引用
收藏
页码:101 / 106
页数:6
相关论文
共 50 条
  • [11] Efficient collision attacks on smart card implementations of masked AES
    Wang An
    Wang ZongYue
    Zheng XueXin
    Wang XiaoMei
    Chen Man
    Zhang GuoShuang
    Wu LiJi
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (05) : 1 - 15
  • [12] Side-Channel Attacks on Masked Bitsliced Implementations of AES
    Radulescu, Anca
    Choudary, Marios O.
    CRYPTOGRAPHY, 2022, 6 (03)
  • [13] Improved Differential Power Analysis Attacks on AES Hardware Implementations
    Han, Yu
    Zou, Xuecheng
    Liu, Zhenglin
    Chen, Yicheng
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2230 - 2233
  • [14] Electromagnetic correlation analysis attacks on microcontroller implementations of AES in far field
    Zhang, Peng
    Deng, Gaoming
    Chen, Kaiyan
    Zhao, Qiang
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2009, 37 (08): : 31 - 34
  • [15] Securing AES Implementation Against Fault Attacks
    Genelle, Laurie
    Giraud, Christophe
    Prouff, Emmanuel
    2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 51 - 62
  • [16] Securing AES Implementation Against Fault Attacks
    Genelle, Laurie
    Giraud, Christophe
    Prouff, Emmanuel
    PROCEEDINGS OF THE 2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 51 - 62
  • [17] Experimental Implementation of DPA Attacks on AES Design with Flash-based FPGA Technology
    Kamoun, Najeh
    Bossuet, Lilian
    Ghazel, Adel
    2009 6TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS AND DEVICES, VOLS 1 AND 2, 2009, : 964 - +
  • [18] ON THE RELATED-KEY ATTACKS AGAINST AES
    Daemen, Joan
    Rijmen, Vincent
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2012, 13 (04): : 395 - 400
  • [19] Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
    Renauld, Mathieu
    Standaert, Francois-Xavier
    Veyrat-Charvillon, Nicolas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 97 - 111
  • [20] Low Cost AES Protection Against DPA Using Rolling Codes
    Albiol, P.
    Manich, S.
    Arumi, D.
    Rodriguez-Montanes, R.
    Gomez-Pau, A.
    2021 XXXVI CONFERENCE ON DESIGN OF CIRCUITS AND INTEGRATED SYSTEMS (DCIS21), 2021, : 154 - 159