Differential Power Analysis Attack on ARM based AES Implementation without Explicit Synchronization

被引:0
|
作者
Petrvalsky, Martin [1 ]
Drutarovsky, Milos [1 ]
Varchola, Michal [2 ]
机构
[1] Tech Univ Kosice, Dept Elect & Multimedia Commun, Kosice, Slovakia
[2] Tech Univ Kosice, Dept Elect & Multimedia Commun, ELIT Syst Sro, Kosice, Slovakia
关键词
Differential Power Analysis; ARM processor; AES; elastic alignment; Dynamic Time Warping;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents Differential Power Analysis (DPA) attack on 32-bit ARM Cortex-M3 microprocessor. Attacked algorithm is unprotected Advanced Encryption Standard (AES) with 128-bit key. DPA attack is deployed on the ARM processor by measuring its instantaneous power consumption during encryption algorithm. Analyzed power consumption traces obtained from the measurement are out-of-sync as they would be during the realistic DPA attack without using trigger to synchronize the traces. Unaligned traces or regular methods of static alignment are inappropriate for further analysis. In this paper elastic alignment methods are used for the trace synchronization. Dynamic Time Warping (DTW) and its fast algorithm FastDTW are deployed in order to match similar patterns in reference and misaligned power consumption traces. Output of DTW - optimal path is then used for the alignment process. Aligned traces are used for further processing and evaluation of the DPA attack. The result is successful DPA attack on misaligned power consumption traces and recovery of the secret 128-bit key. Results are comparable with DPA attack using trigger to align power traces during measurement.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] VLSI implementation of an AES algorithm resistant to differential power analysis attack
    Zhao, Jia
    Han, Jun
    Zeng, Xiaoyang
    Chen, Jun
    ASICON 2007: 2007 7TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2007, : 838 - 841
  • [2] Power Analysis Attack of an AES GPU Implementation
    Chao Luo
    Yunsi Fei
    Liwei Zhang
    A. Adam Ding
    Pei Luo
    Saoni Mukherjee
    David Kaeli
    Journal of Hardware and Systems Security, 2018, 2 (1) : 69 - 82
  • [3] Differential Power Analysis and Differential Fault Attack Resistant AES Algorithm and its VLSI Implementation
    Zhao, Jia
    Han, Jun
    Zeng, Xiaoyang
    Li, Liang
    Deng, Yunsong
    2008 9TH INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED-CIRCUIT TECHNOLOGY, VOLS 1-4, 2008, : 2212 - 2215
  • [4] Power-analysis attack on an ASIC AES implementation
    Örs, SB
    Gürkaynak, F
    Oswald, E
    Preneel, B
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 546 - 552
  • [5] Differential fault analysis attack-tolerant hardware implementation of AES
    Anit Kumar Ghosal
    Amit Sardar
    Dipanwita Roy Chowdhury
    The Journal of Supercomputing, 2024, 80 : 4648 - 4681
  • [6] Differential fault analysis attack-tolerant hardware implementation of AES
    Ghosal, Anit Kumar
    Sardar, Amit
    Chowdhury, Dipanwita Roy
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (04): : 4648 - 4681
  • [7] Novel Hybrid CMOS/Memristor Implementation of the AES Algorithm Robust Against Differential Power Analysis Attack
    Masoumi, Massoud
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2020, 67 (07) : 1314 - 1318
  • [8] Cache based AES attack implementation and its theoretical analysis
    Zhang, Suiyu
    Han, Jun
    Lu, Shiting
    Zeng, Xiaoyang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2011, 48 (06): : 955 - 963
  • [9] A Novel Correlation Power Analysis Attack on PIC Based AES-128 without Access to Crypto Device
    Adegbite, Oluwadara
    Hasan, Syed Rafay
    2017 IEEE 60TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2017, : 1320 - 1323
  • [10] Neural Network Based Attack on a Masked Implementation of AES
    Gilmore, Richard
    Hanley, Neil
    O'Neill, Maire
    2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2015, : 106 - 111