Correlation power analysis of modes of encryption in AES and its countermeasures

被引:11
|
作者
Fahd, Shah [1 ]
Afzal, Mehreen [1 ]
Abbas, Haider [1 ,2 ]
Iqbal, Waseem [1 ]
Waheed, Salman [3 ]
机构
[1] Natl Univ Sci & Technol, Islamabad 44000, Pakistan
[2] Florida Inst Technol, Melbourne, FL 32901 USA
[3] Int Islamic Univ, Islamabad, Pakistan
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 83卷
关键词
Side channel analysis; Correlation power analysis; Modes of encryption; Signal to noise ratio; Number of traces; Random S-box; Fault injections; SIDE-CHANNEL CRYPTANALYSIS; INJECTION ATTACKS; FAULT; SECRET;
D O I
10.1016/j.future.2017.06.004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure implementation of cryptographic algorithms is an important area of research. Cryptographer prefers to secure algorithms against known attacks; however designer focuses on efficient implementation. It has been established in several researches that an attack on implementation of a cipher requires far less effort than exploiting mathematical weakness of the structure. Implementation vulnerabilities are utilized by side channel attacks (SCA). In practical environment a block cipher is implemented in one of the modes of encryption like ECB, CBC, CTR. Our research focuses on finding leakage points in different modes of encryption including GCM to build hypothetical power consumption model for correlation power analysis (CPA) attack. CPA is simulated on AES-128-ECB in PIC18F4520 which yields secret key extraction in 2346 traces. Algorithmic level countermeasures for Counter mode and GCM mode are also presented. Proposed Counter and GCM mode implementation in FPGA yields 0.179% and 6.66% area overhead respectively, Authentication structure of proposed GCM is tolerant against fault injection attacks and propagates error with high probability. Single bit modifies approximately 51% bits in subsequent multiplications and disturbing the Tag by 48%. This research also highlights future recommendations for designing new resilient modes of encryption against power analysis attacks. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:496 / 509
页数:14
相关论文
共 50 条
  • [41] Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE
    Isobe, Takanori
    Minematsu, Kazuhiko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 313 - 324
  • [42] Multiplicative masking and power analysis of AES
    Golic, JD
    Tymen, C
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002, 2002, 2523 : 198 - 212
  • [43] Analysis of Ciphertext Behaviour Using the Example of the AES Block Cipher in ECB, CBC, OFB and CFB Modes of Operation, Using Multiple Encryption
    Alimzhanova, Zhanna
    Nazarbayev, Dauren
    Ayashova, Aizada
    Kaliyeva, Aktoty
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2022, PT II, 2022, 13758 : 621 - 629
  • [44] Anatomy of Differential Power Analysis for AES
    Ambrose, Jude Angelo
    Aldon, Naeill
    Ignjatovic, Aleksandar
    Parameswaran, Sri
    PROCEEDINGS OF THE 10TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING, 2009, : 459 - 466
  • [45] On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption
    Zhao, Liang
    Adhikari, Avishek
    Xiao, Di
    Sakurai, Kouichi
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2012, 17 (08) : 3303 - 3327
  • [46] A Hybrid Chaos-AES Encryption Algorithm and Its Impelmention Based on FPGA
    Atteya, Ahmed M.
    Madian, Ahmed H.
    2014 IEEE 12TH INTERNATIONAL NEW CIRCUITS AND SYSTEMS CONFERENCE (NEWCAS), 2014, : 217 - 220
  • [47] Side-Channel Analysis of a High-Throughput AES Peripheral with Countermeasures
    Heinz, Benedikt
    Heyszl, Johann
    Stumpf, Frederic
    2014 14TH INTERNATIONAL SYMPOSIUM ON INTEGRATED CIRCUITS (ISIC), 2014, : 25 - 29
  • [48] Countermeasures against EM Analysis for a Secured FPGA-based AES Implementation
    Maistri, P.
    Tiran, S.
    Maurine, P.
    Koren, I.
    Leveugle, R.
    2013 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2013,
  • [49] Correlated Power Noise Generator as a Low Cost DPA Countermeasures to Secure Hardware AES Cipher
    Kamoun, Najeh
    Bossuet, Lilian
    Ghazel, Adel
    2009 3RD INTERNATIONAL CONFERENCE ON SIGNALS, CIRCUITS AND SYSTEMS (SCS 2009), 2009, : 341 - +
  • [50] Lightweight Implementation of the AES Encryption Algorithm for IoT Applications Constrained by Memory and Processing Power
    Baneasa, Andrei
    Donca, Radu
    Besoiu, Sorin
    Buleandra, Debora
    2024 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS, AQTR, 2024, : 35 - 40