Correlation power analysis of modes of encryption in AES and its countermeasures

被引:11
|
作者
Fahd, Shah [1 ]
Afzal, Mehreen [1 ]
Abbas, Haider [1 ,2 ]
Iqbal, Waseem [1 ]
Waheed, Salman [3 ]
机构
[1] Natl Univ Sci & Technol, Islamabad 44000, Pakistan
[2] Florida Inst Technol, Melbourne, FL 32901 USA
[3] Int Islamic Univ, Islamabad, Pakistan
关键词
Side channel analysis; Correlation power analysis; Modes of encryption; Signal to noise ratio; Number of traces; Random S-box; Fault injections; SIDE-CHANNEL CRYPTANALYSIS; INJECTION ATTACKS; FAULT; SECRET;
D O I
10.1016/j.future.2017.06.004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure implementation of cryptographic algorithms is an important area of research. Cryptographer prefers to secure algorithms against known attacks; however designer focuses on efficient implementation. It has been established in several researches that an attack on implementation of a cipher requires far less effort than exploiting mathematical weakness of the structure. Implementation vulnerabilities are utilized by side channel attacks (SCA). In practical environment a block cipher is implemented in one of the modes of encryption like ECB, CBC, CTR. Our research focuses on finding leakage points in different modes of encryption including GCM to build hypothetical power consumption model for correlation power analysis (CPA) attack. CPA is simulated on AES-128-ECB in PIC18F4520 which yields secret key extraction in 2346 traces. Algorithmic level countermeasures for Counter mode and GCM mode are also presented. Proposed Counter and GCM mode implementation in FPGA yields 0.179% and 6.66% area overhead respectively, Authentication structure of proposed GCM is tolerant against fault injection attacks and propagates error with high probability. Single bit modifies approximately 51% bits in subsequent multiplications and disturbing the Tag by 48%. This research also highlights future recommendations for designing new resilient modes of encryption against power analysis attacks. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:496 / 509
页数:14
相关论文
共 50 条
  • [1] Correlation power analysis for AES encryption device
    Zhang Xiaoyu
    Chen Kaiyan
    Zhang Yang
    Gui Weilong
    Li Lei
    PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 1003 - 1009
  • [2] Attack on AES Encryption Microcontroller Devices With Correlation Power Analysis
    Nuradha, Faisal Rahman
    Putra, Septafiansyah Dwi
    Kurniawan, Yusuf
    Rizqulloh, Muhammad Adli
    2019 INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND SMART DEVICES (ISESD 2019): FUTURE SMART DEVICES AND NANOTECHNOLOGY FOR MICROELECTRONICS, 2019,
  • [3] A Highly Efficient Power Model for Correlation Power Analysis (CPA) of Pipelined Advanced Encryption Standard (AES)
    Ng, Jun-Sheng
    Chen, Juncheng
    Kyaw, Nay Aung
    Lwin, Ne Kyaw Zwa
    Ho, Weng-Geng
    Chong, Kwen-Siong
    Gwee, Bah-Hwee
    2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [4] Performance analysis of AES encryption operation modes for IoT devices
    Dias Serra, Luis Filipe
    Baptista Goncalves, Pedro Goncalo
    Lopes Frazalo, Luis Alexandre
    Goncalves Antunes, Mario Joao
    PROCEEDINGS OF 2021 16TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI'2021), 2021,
  • [5] Correlation Power Analysis using Bit-Level Biased Activity Plaintexts against AES Cores with Countermeasures
    Fujimoto, Daisuke
    Miura, Noriyuki
    Nagata, Makoto
    Hayashi, Yuichi
    Homma, Naofumi
    Aoki, Takafumi
    Hori, Yohei
    Katashita, Toshihiro
    Sakiyama, Kazuo
    Thanh-Ha Le
    Bringer, Julien
    Bazargan-Sabet, Pirouz
    Bhasin, Shivam
    Danger, Jean-Luc
    2014 INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY, TOKYO (EMC'14/TOKYO), 2014, : 306 - 309
  • [6] Presilicon evaluation on Correlation Power Analysis attacks and countermeasures
    Damian, B. M.
    Hascsi, Z.
    Sandulescu, A. B.
    2017 IEEE 23RD INTERNATIONAL SYMPOSIUM FOR DESIGN AND TECHNOLOGY IN ELECTRONIC PACKAGING (SIITME), 2017, : 313 - 317
  • [7] An Area-optimized Implementation for AES with Hybrid Countermeasures against Power Analysis
    Kamal, Abdel Alim
    Youssef, Amr M.
    ISSCS 2009: INTERNATIONAL SYMPOSIUM ON SIGNALS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS,, 2009, : 161 - 164
  • [8] Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals
    Lee, You-Seok
    Lee, Young-Jun
    Han, Dong-Guk
    Kim, Ho-Won
    Kim, Hyoung-Nam
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (06) : 1091 - 1094
  • [9] Implementation and Analysis of AES Encryption on GPU
    Li, Qinjian
    Zhong, Chengwen
    Zhao, Kaiyong
    Mei, Xinxin
    Chu, Xiaowen
    2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS), 2012, : 843 - 848
  • [10] An Evaluation of AES Encryption Modes on Data Transmission Performance in Distributed Systems
    Aydos, Bilal
    Yigit, Ibrahim Onuralp
    Candan, Kemal
    Bolata, Oguz Yusuf
    Altmay, Selcuk
    32ND IEEE SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, SIU 2024, 2024,