Correlation power analysis of modes of encryption in AES and its countermeasures

被引:11
|
作者
Fahd, Shah [1 ]
Afzal, Mehreen [1 ]
Abbas, Haider [1 ,2 ]
Iqbal, Waseem [1 ]
Waheed, Salman [3 ]
机构
[1] Natl Univ Sci & Technol, Islamabad 44000, Pakistan
[2] Florida Inst Technol, Melbourne, FL 32901 USA
[3] Int Islamic Univ, Islamabad, Pakistan
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 83卷
关键词
Side channel analysis; Correlation power analysis; Modes of encryption; Signal to noise ratio; Number of traces; Random S-box; Fault injections; SIDE-CHANNEL CRYPTANALYSIS; INJECTION ATTACKS; FAULT; SECRET;
D O I
10.1016/j.future.2017.06.004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure implementation of cryptographic algorithms is an important area of research. Cryptographer prefers to secure algorithms against known attacks; however designer focuses on efficient implementation. It has been established in several researches that an attack on implementation of a cipher requires far less effort than exploiting mathematical weakness of the structure. Implementation vulnerabilities are utilized by side channel attacks (SCA). In practical environment a block cipher is implemented in one of the modes of encryption like ECB, CBC, CTR. Our research focuses on finding leakage points in different modes of encryption including GCM to build hypothetical power consumption model for correlation power analysis (CPA) attack. CPA is simulated on AES-128-ECB in PIC18F4520 which yields secret key extraction in 2346 traces. Algorithmic level countermeasures for Counter mode and GCM mode are also presented. Proposed Counter and GCM mode implementation in FPGA yields 0.179% and 6.66% area overhead respectively, Authentication structure of proposed GCM is tolerant against fault injection attacks and propagates error with high probability. Single bit modifies approximately 51% bits in subsequent multiplications and disturbing the Tag by 48%. This research also highlights future recommendations for designing new resilient modes of encryption against power analysis attacks. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:496 / 509
页数:14
相关论文
共 50 条
  • [21] Evaluation of Correlation Power Analysis Resistance and Its Application on Asymmetric Mask Protected Data Encryption Standard Hardware
    Shan, Weiwei
    Chen, Xin
    Li, Bo
    Cao, Peng
    Li, Jie
    Gao, Gugang
    Shi, Longxing
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2013, 62 (10) : 2716 - 2724
  • [22] Advanced Modes in AES: Are they Safe from Power Analysis based Side Channel Attacks?
    Jayasinghe, Darshana
    Ragel, Roshan
    Ambrose, Jude Angelo
    Ignjatovic, Aleksandar
    Parameswaran, Sri
    2014 32ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2014, : 166 - 173
  • [23] Optimization of AES and RSA Algorithm and Its Mixed Encryption System
    Liu, Jia
    Fan, Chunlei
    Tian, Xingyu
    Ding, Qun
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT II, 2018, 82 : 393 - 403
  • [24] Improved Collision-Correlation Power Analysis on First Order Protected AES
    Clavier, Christophe
    Feix, Benoit
    Gagnerot, Georges
    Roussellet, Mylene
    Verneuil, Vincent
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 49 - +
  • [25] Success Rate Model for Fully AES-128 in Correlation Power Analysis
    Pammu, Ali Akbar
    Chong, Kwen-Siong
    Lwin, Ne Kyaw Zwa
    Ho, Weng-Geng
    Liu, Nan
    Gwee, Bah-Hwee
    2016 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS), 2016, : 115 - 118
  • [26] On the ability of AES S-Boxes to secure against correlation power analysis
    Liu, Zheng-lin
    Guo, Xu
    Chen, Yi-cheng
    Han, Yu
    Zou, Xue-cheng
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 43 - +
  • [27] Analysis of countermeasures against access driven cache attacks on AES
    Bloemer, Johannes
    Krummel, Volker
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 96 - 109
  • [28] Analysis of Information Security of Electric Power Big Data and Its Countermeasures
    Zhao, Junfeng
    Wang, Yongmei
    Xia, Yuanyi
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 243 - 248
  • [29] Differential fault analysis on AES key schedule and some countermeasures
    Chen, CN
    Yen, SM
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 118 - 129
  • [30] Power analysis attacks and countermeasures
    Popp, Thomas
    Mangard, Stefan
    Oswald, Elisabeth
    IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 535 - 543