The research of DPA attacks against AES implementations

被引:0
|
作者
HAN Yu
机构
关键词
AES implementation; side-channel leakage; DPA; CPA; power model; power trace;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
This article examines vulnerabilities to power analysis attacks between software and hardware implementations of cryptographic algorithms. Representative platforms including an Atmel 89S8252 8-bit processor and a 0.25 μm 1.8 v standard cell circuit are proposed to implement the advance encryption standard (AES). A simulation-based experimental environment is built to acquire power data, and single-bit differential power analysis (DPA), and multi-bit DPA and correlation power analysis (CPA) attacks are conducted on two implementations respectively. The experimental results show that the hardware implementation has less data-dependent power leakages to resist power attacks. Furthermore, an improved DPA approach is proposed. It adopts hamming distance of intermediate results as power model and arranges plaintext inputs to differentiate power traces to the maximal probability. Compared with the original power attacks, our improved DPA performs a successful attack on AES hardware implementations with acceptable power measurements and fewer computations.
引用
收藏
页码:101 / 106
页数:6
相关论文
共 50 条
  • [41] Analysis of countermeasures against access driven cache attacks on AES
    Bloemer, Johannes
    Krummel, Volker
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 96 - 109
  • [42] Scrambler Based AES for Countermeasure Against Power Analysis Attacks
    Kang, Young-Jin
    Kim, Ki-Hwan
    Lee, HoonJae
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING, 2020, 590 : 152 - 157
  • [43] Securing AES Designs Against Power Analysis Attacks: A Survey
    Singha, Thockchom Birjit
    Palathinkal, Roy Paily
    Ahamed, Shaik Rafi
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (16) : 14332 - 14356
  • [44] An Efficient AES Implementation against Timing Attacks Based on SoC
    Wang, Rui-jiao
    Zhang, Lu-guo
    Zheng, Bin
    ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010), 2010, : 357 - 360
  • [45] Differential Fault Attacks against AES Tampering with the Instruction Flow
    Mella, Silvia
    Melzani, Filippo
    Visconti, Andrea
    2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 439 - 444
  • [46] PRACTICAL DPA ATTACKS ON MDPL
    De Mulder, Elke
    Gierlichs, Benedikt
    Preneel, Bart
    Verbauwhede, Ingrid
    2009 FIRST IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2009, : 191 - +
  • [47] Deep learning side-channel attack against hardware implementations of AES
    Kubota, Takaya
    Yoshida, Kota
    Shiozaki, Mitsuru
    Fujino, Takeshi
    MICROPROCESSORS AND MICROSYSTEMS, 2021, 87
  • [48] Deep Learning Side-Channel Attack against Hardware Implementations of AES
    Kubota, Takaya
    Yoshida, Kota
    Shiozaki, Mitsuru
    Fujino, Takeshi
    2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 261 - 268
  • [49] Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication Formula
    Kabin, Ievgen
    Dyka, Zoya
    Klann, Dan
    Langendoerfer, Peter
    2019 14TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS 2019), 2019,
  • [50] Formal evaluation of the robustness of dual-rail logic against DPA attacks
    Razafindraibe, Alin
    Robert, Michel
    Maurine, Philippe
    INTEGRATED CIRCUIT AND SYSTEM DESIGN: POWER AND TIMING MODELING, OPTIMIZATION AND SIMULATION, 2006, 4148 : 634 - 644