The research of DPA attacks against AES implementations

被引:0
|
作者
HAN Yu
机构
关键词
AES implementation; side-channel leakage; DPA; CPA; power model; power trace;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
This article examines vulnerabilities to power analysis attacks between software and hardware implementations of cryptographic algorithms. Representative platforms including an Atmel 89S8252 8-bit processor and a 0.25 μm 1.8 v standard cell circuit are proposed to implement the advance encryption standard (AES). A simulation-based experimental environment is built to acquire power data, and single-bit differential power analysis (DPA), and multi-bit DPA and correlation power analysis (CPA) attacks are conducted on two implementations respectively. The experimental results show that the hardware implementation has less data-dependent power leakages to resist power attacks. Furthermore, an improved DPA approach is proposed. It adopts hamming distance of intermediate results as power model and arranges plaintext inputs to differentiate power traces to the maximal probability. Compared with the original power attacks, our improved DPA performs a successful attack on AES hardware implementations with acceptable power measurements and fewer computations.
引用
收藏
页码:101 / 106
页数:6
相关论文
共 50 条
  • [31] An Improved and Efficient Countermeasure against Fault Attacks for AES
    Bedoui, Mouna
    Mestiri, Hassen
    Bouallegue, Belgacem
    Marzougui, Mehrez
    Qayyum, Mohammed
    Machhout, Mohsen
    2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), 2017, : 209 - 212
  • [32] Cache-collision timing attacks against AES
    Bonneau, Joseph
    Mironov, Ilya
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 201 - 215
  • [33] DPA on hardware implementations of Ascon and Keyak
    Samwel, Niels
    Daemen, Joan
    ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2017, 2017, : 415 - 424
  • [34] Current mask generation: A transistor level security against DPA attacks
    Mesquita, D
    Techer, JD
    Torres, L
    Sassatelli, G
    Cambon, G
    Robert, M
    Moraes, F
    SBCCI 2005: 18TH SYMPOSIUM ON INTEGRATED CIRCUITS AND SYSTEMS DESIGN, PROCEEDINGS, 2005, : 115 - 120
  • [35] DPA Attacks Simulator against Cryptography System on Algorithm Design Phase
    Yoshikawa, Masaya
    Asai, Toshiya
    WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2011, VOL II, 2011, : 792 - 796
  • [36] Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks
    Kabin, Ievgen
    Dyka, Zoya
    Kreiser, Dan
    Langendoerfer, Peter
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 225 - 235
  • [37] Threshold implementations against side-channel attacks and glitches
    Nikova, Svetla
    Rechberger, Christian
    Rijmen, Vincent
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 529 - +
  • [38] Practical state recovery attacks against legacy RNG implementations
    Cohney, Shaanan N.
    Green, Matthew D.
    Heninger, Nadia
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 265 - 280
  • [39] Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks
    Kamal, Abdel Alim
    Youssef, Amr M.
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (04) : 227 - 240
  • [40] An algebraic masking method to protect AES against power attacks
    Courtois, Nicolas T.
    Goubin, Louis
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005, 2006, 3935 : 199 - 209