An Efficient Collision Power Attack on AES Encryption in Edge Computing

被引:26
|
作者
Niu, Yongchuan [1 ,2 ]
Zhang, Jiawei [2 ]
Wang, An [1 ,3 ]
Chen, Caisen [4 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci, Beijing 100081, Peoples R China
[2] Data Commun Sci & Technol Res Inst, Beijing 100191, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, Key Lab Network Assessment Technol, Beijing 100093, Peoples R China
[4] Army Acad Armored Forces, Mil Exercise & Training Ctr, Beijing 100072, Peoples R China
基金
中国国家自然科学基金;
关键词
Edge computing; collision attack; scalable collision; side-channel attack; linear layer;
D O I
10.1109/ACCESS.2019.2896256
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Edge computing has become a promising paradigm for the context-aware and delay-sensitive IoT data analytics. For the sake of security, some cryptographic algorithms such as AES, RSA, and so on, are employed for the encryption communication and authentication. The collision power attack is a typical physical attack to recover the secret key of the AES algorithm. However, almost all collision attacks aim at the detection of internal collisions caused by the output of S-boxes, and the linear layers are not concerned with those protected implementations. The relation between the mask and the masked data has been given little attention and stays as is, where the leakages still exist. In this paper, we focus on three typical AES implementations in edge computing, and propose a new type of collision attack by making use of leakages from linear layers, which is capable of breaking masking schemes with uniformly distributed random masks. In addition, a novel scalable collision attack of general applicability and high-efficiency is proposed and applied to masked linear layers and masked S-boxes. It can reach an equal level of performance compared to the second-order power analysis with acceptable off-line search, which improves the known collision attacks significantly.
引用
收藏
页码:18734 / 18748
页数:15
相关论文
共 50 条
  • [1] Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing
    Ding, Yaoling
    Shi, Ying
    Wang, An
    Zheng, Xuexin
    Wang, Zongyue
    Zhang, Guoshuang
    IEEE ACCESS, 2019, 7 : 63217 - 63229
  • [2] Attack on AES Encryption Microcontroller Devices With Correlation Power Analysis
    Nuradha, Faisal Rahman
    Putra, Septafiansyah Dwi
    Kurniawan, Yusuf
    Rizqulloh, Muhammad Adli
    2019 INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND SMART DEVICES (ISESD 2019): FUTURE SMART DEVICES AND NANOTECHNOLOGY FOR MICROELECTRONICS, 2019,
  • [3] Side Channel Attack Countermeasure for Low Power Devices with AES Encryption
    Ruminot-Ahumada, Nicolas
    Valencia-Cordero, Claudio
    Abarzua-Ortiz, Rodrigo
    2021 IEEE IFAC INTERNATIONAL CONFERENCE ON AUTOMATION/XXIV CONGRESS OF THE CHILEAN ASSOCIATION OF AUTOMATIC CONTROL (IEEE IFAC ICA - ACCA2021), 2021,
  • [4] Collision Forgery Attack on the AES-OTR Algorithm under Quantum Computing
    Chang, Lipeng
    Wei, Yuechuan
    Wang, Xiangru
    Pan, Xiaozhong
    SYMMETRY-BASEL, 2022, 14 (07):
  • [5] An efficient and secure aggregation encryption scheme in edge computing
    Wu, Junhua
    Sheng, Xiaofei
    Li, Guangshun
    Yu, Kan
    Liu, Junke
    CHINA COMMUNICATIONS, 2022, 19 (03) : 245 - 257
  • [6] An Efficient and Secure Aggregation Encryption Scheme in Edge Computing
    Junhua Wu
    Xiaofei Sheng
    Guangshun Li
    Kan Yu
    Junke Liu
    ChinaCommunications, 2022, 19 (03) : 245 - 257
  • [7] Improved DPA Attack Method on AES Encryption
    Lan, S.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 448 - 449
  • [8] Distributed AES encryption based on grid computing
    Tong, Hengjian
    Xia, Zuzhuan
    Li, Xiang
    PROGRESS IN INTELLIGENCE COMPUTATION AND APPLICATIONS, PROCEEDINGS, 2007, : 680 - 682
  • [9] Efficient Implementations for AES Encryption and Decryption
    Rachh, Rashmi Ramesh
    Mohan, P. V. Ananda
    Anami, B. S.
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2012, 31 (05) : 1765 - 1785
  • [10] FPGA Implementation of Efficient AES Encryption
    Priya, S. Sridevi Sathya
    Kumar, P. Karthigai
    SivaMangai, N. M.
    Rejula, V.
    2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,