A Security Comparison between AES-128 and AES-256 FPGA implementations against DPA attacks

被引:0
|
作者
Zuniga Gonzalez, Virginia [1 ]
Tena-Sanchez, Erica [1 ,2 ]
Acosta, Antonio J. [1 ,3 ]
机构
[1] Univ Seville, CSIC, Inst Microelect Sevilla, Seville, Spain
[2] Univ Seville, Escuela Politecn Super, Dept Elect Technol, Seville, Spain
[3] Univ Seville, Fac Phys, Dept Elect & Electromagnetism, Seville, Spain
基金
欧盟地平线“2020”;
关键词
Security comparison; AES cipher; Differential Power Analysis attack; MTD; FPGA;
D O I
10.1109/DCIS58620.2023.10336003
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As the AES is the standard symmetric cipher selected by NIST, is the best-known and the most widely used block cipher. Consequently, security threats are constantly rising and increasingly powerful. With the addition of the upcoming scenario of quantum computing, these threats have become a front-line concern in the crypto-community. Although is claimed that using larger key sizes in symmetric key algorithms for implementing quantum-resistant implementations is enough to counteract brute force attacks, this paper shows that both AES128 and AES-256 are vulnerable to Power Analysis attacks. This paper presents a security comparison against Differential Power Analysis (DPA) attacks over both AES 128-256. Through experimental attacks in FPGA AES implementations, results show that although AES-256 reaches a greater level of security than AES128, is still vulnerable to this kind of attack. Specifically, we have obtained 75% of the bytes needed to find the original key for AES-128 while only 28.125% for AES-256 by performing the same attack.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Switching between the AES-128 and AES-256 Using Ks * & Two Keys
    Shuwandy, Moceheb Lazam
    Salih, Ali Khalil
    Alameen, Firas Layth Khaleel
    Habbal, Adib M. Monzer
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (08): : 136 - 140
  • [2] Repeated Differential Properties of the AES-128 and AES-256 Key Schedules
    Huang, Jianyong
    Susilo, Willy
    Seberry, Jennifer
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 525 - 532
  • [3] Cryptanalysis of AES-128 and AES-256 Block Ciphers Using Lorenz Information Measure
    Karuvandan, Vetrivel
    Chellamuthu, Senthamarai
    Periyasamy, Shantharajah
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2016, 13 (6B) : 1054 - 1060
  • [4] Security Bound of Biclique Attacks on AES-128
    Dong, Xiaoli
    Chen, Jie
    International Journal of Network Security, 2021, 23 (02) : 286 - 295
  • [6] The research of DPA attacks against AES implementations
    Department of Electronic Science and Technology, Huazhong University of Science and Technology, Wuhan, 430074, China
    J. China Univ. Post Telecom., 2008, 4 (101-106):
  • [7] 可兼容AES-128、AES-192、AES-256串行AES加密解密电路设计
    韩少男
    李晓江
    微电子学与计算机, 2010, 27 (11) : 40 - 45+50
  • [8] FPGA implementation of Combined AES-128
    Rao, M. Rajeswara
    Sharma, R. K.
    2017 8TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2017,
  • [9] AES-128 implementation on a Virtex-4 FPGA
    Wiebe, James H.
    2007 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY, VOLS 1-3, 2007, : 271 - 276
  • [10] Related-key rectangle attacks on reduced AES-192 and AES-256
    Kim, Jongsung
    Hong, Seokhie
    Preneel, Bart
    FAST SOFTWARE ENCRYPTION, 2007, 4593 : 225 - +