A CPA Attack against Cryptographic Hardware Implementation on SASEBO-GII

被引:0
|
作者
Mestiri, Hassen [1 ]
Kahri, Fatma [1 ]
Bouallegue, Belgacem [1 ]
Machhout, Mohsen [1 ]
机构
[1] Univ Monastir, Fac Sci Monastir, Elect & Microelect Lab, Monastir, Tunisia
关键词
Side Channel Attacks (SCA); Correlation Power Analysis (CPA); Hamming Distance model (HD); Advanced Encryption Standard (AES);
D O I
暂无
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Cryptographic circuits are used in electronic devices to protect the confidential data. Those circuits store the encryption key to use in the cryptographic algorithms as the Advanced Encryption Standard algorithm (AES). The Correlation Power Analysis attack (CPA) is powerful cryptanalysis techniques that based on exploiting a linear relation between the real and predicted cryptographic circuits' power consumption. In this paper, we explain the CPA attack process against AES implemented on SASEBO-GII FPGA platform. The experimental results demonstrate that the CPA attack based on Hamming Weight power consumption model cannot extract the correct AES keys. However, the CPA based on Hamming Distance power consumption model can extract successfully all the encryption key bytes. In addition, the CPA attacks results show that using Hamming Distance, 100% of encryption key appears at about 4300 power traces.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] A MORE PRACTICAL CPA ATTACK AGAINST PRESENT HARDWARE IMPLEMENTATION
    Wang, Chenxu
    Yu, Mingyan
    Wang, Jinxiang
    Jiang, Peihe
    Tang, Xiaochen
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 1248 - 1253
  • [2] A CPA Attack against Round Based Piccolo-80 Hardware Implementation
    Wang, Chenxu
    Xie, Xuejun
    Yu, Mingyan
    Wang, Jinxiang
    Tang, Xiaochen
    2012 5TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), 2012, : 1740 - 1745
  • [3] Side-channel attack countermeasure evaluation of cryptographic hardware implementation circuit
    Asai, Toshiya
    Asahi, Kensaku
    Shiozaki, Mitsuru
    Fujino, Takeshi
    Yoshikawa, Masaya
    IEEJ Transactions on Electronics, Information and Systems, 2014, 134 (12) : 1767 - 1774
  • [4] On the Synthesis of Attack Tolerant Cryptographic Hardware
    Mathew, J.
    Banerjee, S.
    Rahaman, H.
    Pradhan, D. K.
    Mohanty, S. P.
    Jabir, A. M.
    PROCEEDINGS OF THE 2010 18TH IEEE/IFIP INTERNATIONAL CONFERENCE ON VLSI AND SYSTEM-ON-CHIP, 2010, : 286 - 291
  • [5] Hardware Implementation of Ultralightweight Cryptographic Protocols
    Ul Ain, Qurat
    Mujahid, Umar
    Najam-ul-islam, M.
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), 2015,
  • [6] An Experimental CPA attack for Arduino Cryptographic Module and Analysis in Software-based CPA Countermeasures
    Kang, Young Jin
    Kim, Tae Yong
    Jo, Jung Bok
    Lee, Hoon Jae
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 261 - 270
  • [7] EFFICIENT METHOD FOR RANDOM FAULT ATTACK AGAINST AES HARDWARE IMPLEMENTATION
    Liao, Nan
    Cui, Xiaoxin
    Wang, Tian
    Liao, Kai
    Yu, Dunshan
    Cui, Xiaole
    2016 CHINA SEMICONDUCTOR TECHNOLOGY INTERNATIONAL CONFERENCE (CSTIC), 2016,
  • [8] IMPROVING CPA ATTACK AGAINST DSA AND ECDSA
    Repka, Marek
    Varchola, Michal
    Drutarovsky, Milos
    JOURNAL OF ELECTRICAL ENGINEERING-ELEKTROTECHNICKY CASOPIS, 2015, 66 (03): : 159 - 163
  • [9] Fault attack resistant cryptographic hardware with uniform error detection
    Kulikowski, Konrad J.
    Karpovsky, Mark G.
    Taubin, Alexander
    FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2006, 4236 : 185 - 195
  • [10] High performance cryptographic engine PANAMA: Hardware implementation
    Selimis, G
    Kitsos, P
    Koufopavlou, O
    ICECS 2004: 11TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, 2004, : 575 - 578