An Efficient Collision Power Attack on AES Encryption in Edge Computing

被引:26
|
作者
Niu, Yongchuan [1 ,2 ]
Zhang, Jiawei [2 ]
Wang, An [1 ,3 ]
Chen, Caisen [4 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci, Beijing 100081, Peoples R China
[2] Data Commun Sci & Technol Res Inst, Beijing 100191, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, Key Lab Network Assessment Technol, Beijing 100093, Peoples R China
[4] Army Acad Armored Forces, Mil Exercise & Training Ctr, Beijing 100072, Peoples R China
基金
中国国家自然科学基金;
关键词
Edge computing; collision attack; scalable collision; side-channel attack; linear layer;
D O I
10.1109/ACCESS.2019.2896256
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Edge computing has become a promising paradigm for the context-aware and delay-sensitive IoT data analytics. For the sake of security, some cryptographic algorithms such as AES, RSA, and so on, are employed for the encryption communication and authentication. The collision power attack is a typical physical attack to recover the secret key of the AES algorithm. However, almost all collision attacks aim at the detection of internal collisions caused by the output of S-boxes, and the linear layers are not concerned with those protected implementations. The relation between the mask and the masked data has been given little attention and stays as is, where the leakages still exist. In this paper, we focus on three typical AES implementations in edge computing, and propose a new type of collision attack by making use of leakages from linear layers, which is capable of breaking masking schemes with uniformly distributed random masks. In addition, a novel scalable collision attack of general applicability and high-efficiency is proposed and applied to masked linear layers and masked S-boxes. It can reach an equal level of performance compared to the second-order power analysis with acceptable off-line search, which improves the known collision attacks significantly.
引用
收藏
页码:18734 / 18748
页数:15
相关论文
共 50 条
  • [21] A Smart Trojan Circuit and Smart Attack Method in AES Encryption Circuits
    Yoshimura, Masayoshi
    Ogita, Amy
    Hosokawa, Toshinori
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFTS), 2013, : 278 - 283
  • [22] Implementation of Efficient Mix Column Transformation for AES encryption
    Priya, S. Sridevi Sathya
    Junias, M.
    Jenifer, Sarah S.
    Lavanya, A.
    2018 4TH INTERNATIONAL CONFERENCE ON DEVICES, CIRCUITS AND SYSTEMS (ICDCS), 2018, : 95 - 100
  • [23] Efficient VLSI Architecture of Medium Throughput AES Encryption
    Panigrahi, Swetalina
    Das, Chinmayee
    Sharma, V. K.
    Mahapatra, K. K.
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2013), 2013, : 975 - 978
  • [24] Efficient VLSI architecture of medium throughput AES encryption
    Panigrahi, Swetalina
    Sharma, V.K.
    Das, Chinmayee
    Mahapatra, K.K.
    Proceedings of IEEE International Conference on Circuit, Power and Computing Technologies, ICCPCT 2013, 2013, : 975 - 978
  • [25] Power Analysis Attack of an AES GPU Implementation
    Chao Luo
    Yunsi Fei
    Liwei Zhang
    A. Adam Ding
    Pei Luo
    Saoni Mukherjee
    David Kaeli
    Journal of Hardware and Systems Security, 2018, 2 (1) : 69 - 82
  • [26] IKW: Inter-Kernel Weights for Power Efficient Edge Computing
    Udupa, Pramod
    Mahale, Gopinath
    Chandrasekharan, Kiran Kolar
    Lee, Sehwan
    IEEE ACCESS, 2020, 8 : 90450 - 90464
  • [27] A Power Efficient IoT Edge Computing Solution for Cooking Oil Recycling
    Gomes, Bruno
    Melo, Nilsa
    Rodrigues, Rafael
    Costa, Pedro
    Carvalho, Celio
    Karmali, Karim
    Karmali, Salim
    Soares, Christophe
    Torres, Jose M.
    Sobral, Pedro
    Moreira, Rui S.
    TRENDS AND INNOVATIONS IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, 2020, 1160 : 113 - 124
  • [28] ECG Encryption Enhancement Technique with Multiple Layers of AES and DNA Computing
    Kh-Madhloom, Jamal
    Abd Ghani, Mohd Khanapi
    Baharon, Mohd Rizuan
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 28 (02): : 493 - 512
  • [29] Enhancing Data Security Using AES Encryption Algorithm in Cloud Computing
    Rajput, Snehal
    Dhobi, J. S.
    Gadhavi, Lata J.
    PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS: VOL 2, 2016, 51 : 135 - 143
  • [30] A Framework Based on RSA and AES Encryption Algorithms for Cloud Computing Services
    Khanezaei, Nasrin
    Hanapi, Zurina Mohd
    2014 IEEE CONFERENCE ON SYSTEMS, PROCESS AND CONTROL (ICSPC 2014), 2014, : 58 - 62