A Security Comparison between AES-128 and AES-256 FPGA implementations against DPA attacks

被引:0
|
作者
Zuniga Gonzalez, Virginia [1 ]
Tena-Sanchez, Erica [1 ,2 ]
Acosta, Antonio J. [1 ,3 ]
机构
[1] Univ Seville, CSIC, Inst Microelect Sevilla, Seville, Spain
[2] Univ Seville, Escuela Politecn Super, Dept Elect Technol, Seville, Spain
[3] Univ Seville, Fac Phys, Dept Elect & Electromagnetism, Seville, Spain
基金
欧盟地平线“2020”;
关键词
Security comparison; AES cipher; Differential Power Analysis attack; MTD; FPGA;
D O I
10.1109/DCIS58620.2023.10336003
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As the AES is the standard symmetric cipher selected by NIST, is the best-known and the most widely used block cipher. Consequently, security threats are constantly rising and increasingly powerful. With the addition of the upcoming scenario of quantum computing, these threats have become a front-line concern in the crypto-community. Although is claimed that using larger key sizes in symmetric key algorithms for implementing quantum-resistant implementations is enough to counteract brute force attacks, this paper shows that both AES128 and AES-256 are vulnerable to Power Analysis attacks. This paper presents a security comparison against Differential Power Analysis (DPA) attacks over both AES 128-256. Through experimental attacks in FPGA AES implementations, results show that although AES-256 reaches a greater level of security than AES128, is still vulnerable to this kind of attack. Specifically, we have obtained 75% of the bytes needed to find the original key for AES-128 while only 28.125% for AES-256 by performing the same attack.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Meet-in-the-middle attacks on 10-round AES-256
    Rongjia Li
    Chenhui Jin
    Designs, Codes and Cryptography, 2016, 80 : 459 - 471
  • [22] Meet-in-the-middle attacks on 10-round AES-256
    Li, Rongjia
    Jin, Chenhui
    DESIGNS CODES AND CRYPTOGRAPHY, 2016, 80 (03) : 459 - 471
  • [23] Improved Single-Key Attacks on 8-Round AES-192 and AES-256
    Orr Dunkelman
    Nathan Keller
    Adi Shamir
    Journal of Cryptology, 2015, 28 : 397 - 422
  • [24] 基于FPGA的AES-128密码算法实现研究
    武玉华
    李艳俊
    周玉坤
    欧海文
    微计算机信息, 2007, (06) : 53 - 54+90
  • [25] Enhancement of Security Mechanism for Confidential Data using AES-128, 192 and 256bit Encryption in Cloud
    Raj, Gaurav
    Kesireddi, Ram Charan
    Gupta, Shruti
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 374 - 378
  • [26] Improved preimage attacks on hash modes of 8-round AES-256
    Deukjo Hong
    Dong-Chan Kim
    Daesung Kwon
    Jongsung Kim
    Multimedia Tools and Applications, 2016, 75 : 14525 - 14539
  • [27] Key Advantage Template Attack Against AES-128 Algorithm
    Fan H.-P.
    Yuan Q.-J.
    Wang X.-Y.
    Wang Y.-J.
    Wang T.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2020, 48 (10): : 2003 - 2008
  • [28] Improved preimage attacks on hash modes of 8-round AES-256
    Hong, Deukjo
    Kim, Dong-Chan
    Kwon, Daesung
    Kim, Jongsung
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (22) : 14525 - 14539
  • [29] AES-128 cipher. Minimum area, low cost FPGA implementation
    Liberatori, M. C.
    Bonadero, J. C.
    LATIN AMERICAN APPLIED RESEARCH, 2007, 37 (01) : 71 - 77
  • [30] A high-throughput area efficient FPGA implementation of AES-128 encryption
    Brokalakis, A
    Kakarountas, AP
    Goutis, CE
    2005 IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS - DESIGN AND IMPLEMENTATION (SIPS), 2005, : 116 - 121