Correlation power analysis of modes of encryption in AES and its countermeasures

被引:11
|
作者
Fahd, Shah [1 ]
Afzal, Mehreen [1 ]
Abbas, Haider [1 ,2 ]
Iqbal, Waseem [1 ]
Waheed, Salman [3 ]
机构
[1] Natl Univ Sci & Technol, Islamabad 44000, Pakistan
[2] Florida Inst Technol, Melbourne, FL 32901 USA
[3] Int Islamic Univ, Islamabad, Pakistan
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 83卷
关键词
Side channel analysis; Correlation power analysis; Modes of encryption; Signal to noise ratio; Number of traces; Random S-box; Fault injections; SIDE-CHANNEL CRYPTANALYSIS; INJECTION ATTACKS; FAULT; SECRET;
D O I
10.1016/j.future.2017.06.004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure implementation of cryptographic algorithms is an important area of research. Cryptographer prefers to secure algorithms against known attacks; however designer focuses on efficient implementation. It has been established in several researches that an attack on implementation of a cipher requires far less effort than exploiting mathematical weakness of the structure. Implementation vulnerabilities are utilized by side channel attacks (SCA). In practical environment a block cipher is implemented in one of the modes of encryption like ECB, CBC, CTR. Our research focuses on finding leakage points in different modes of encryption including GCM to build hypothetical power consumption model for correlation power analysis (CPA) attack. CPA is simulated on AES-128-ECB in PIC18F4520 which yields secret key extraction in 2346 traces. Algorithmic level countermeasures for Counter mode and GCM mode are also presented. Proposed Counter and GCM mode implementation in FPGA yields 0.179% and 6.66% area overhead respectively, Authentication structure of proposed GCM is tolerant against fault injection attacks and propagates error with high probability. Single bit modifies approximately 51% bits in subsequent multiplications and disturbing the Tag by 48%. This research also highlights future recommendations for designing new resilient modes of encryption against power analysis attacks. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:496 / 509
页数:14
相关论文
共 50 条
  • [31] A Comparative Analysis of AES Common Modes of Operation
    Almuhammadi, Sultan
    Al-Hejri, Ibraheem
    2017 IEEE 30TH CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2017,
  • [32] Advanced Encryption Standard New Instructions (AES-NI) Analysis: Security, Performance, and Power Consumption
    AbdAllah, Eslam G.
    Kuang, Yu Rang
    Huang, Changcheng
    PROCEEDINGS OF 2020 12TH INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2020), 2020, : 167 - 172
  • [33] Side Channel Attack Countermeasure for Low Power Devices with AES Encryption
    Ruminot-Ahumada, Nicolas
    Valencia-Cordero, Claudio
    Abarzua-Ortiz, Rodrigo
    2021 IEEE IFAC INTERNATIONAL CONFERENCE ON AUTOMATION/XXIV CONGRESS OF THE CHILEAN ASSOCIATION OF AUTOMATIC CONTROL (IEEE IFAC ICA - ACCA2021), 2021,
  • [34] Side-channel countermeasures utilizing dynamic logic reconfiguration: Protecting AES/Rijndael and Serpent encryption in hardware
    Socha, Petr
    Brejnik, Jan
    Balasch, Josep
    Novotny, Martin
    Mentens, Nele
    MICROPROCESSORS AND MICROSYSTEMS, 2020, 78
  • [35] Multiple countermeasures on unrolled architecture prince against power analysis and its evaluation
    Takemoto S.
    Nozaki Y.
    Yoshikawa M.
    IEEJ Transactions on Electronics, Information and Systems, 2019, 139 (12) : 1380 - 1388
  • [36] AES encryption implementation and analysis on commodity graphics processing units
    Harrison, Owen
    Waldron, John
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2007, PROCEEDINGS, 2007, 4727 : 209 - +
  • [37] Multiple countermeasures on unrolled architecture PRINCE against power analysis and its evaluation
    Takemoto, Shu
    Nozaki, Yusuke
    Yoshikawa, Masaya
    ELECTRONICS AND COMMUNICATIONS IN JAPAN, 2020, 103 (5-6) : 41 - 53
  • [38] Automatic Application of Power Analysis Countermeasures
    Bayrak, Ali Galip
    Regazzoni, Francesco
    Novo, David
    Brisk, Philip
    Standaert, Francois-Xavier
    Ienne, Paolo
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (02) : 329 - 341
  • [39] Research of differential power analysis countermeasures
    Wang, P.-J. (wangpengjun@nbu.edu.cn), 1600, Science Press (34):
  • [40] Correlation power analysis and effective defense approach on light encryption device block cipher
    Rai, Vikash Kumar
    Reddy, Boreddy V.
    Tripathy, Somanath
    Mathew, Jimson
    SECURITY AND PRIVACY, 2019, 2 (05)