Differential Power Analysis Attack on ARM based AES Implementation without Explicit Synchronization

被引:0
|
作者
Petrvalsky, Martin [1 ]
Drutarovsky, Milos [1 ]
Varchola, Michal [2 ]
机构
[1] Tech Univ Kosice, Dept Elect & Multimedia Commun, Kosice, Slovakia
[2] Tech Univ Kosice, Dept Elect & Multimedia Commun, ELIT Syst Sro, Kosice, Slovakia
关键词
Differential Power Analysis; ARM processor; AES; elastic alignment; Dynamic Time Warping;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents Differential Power Analysis (DPA) attack on 32-bit ARM Cortex-M3 microprocessor. Attacked algorithm is unprotected Advanced Encryption Standard (AES) with 128-bit key. DPA attack is deployed on the ARM processor by measuring its instantaneous power consumption during encryption algorithm. Analyzed power consumption traces obtained from the measurement are out-of-sync as they would be during the realistic DPA attack without using trigger to synchronize the traces. Unaligned traces or regular methods of static alignment are inappropriate for further analysis. In this paper elastic alignment methods are used for the trace synchronization. Dynamic Time Warping (DTW) and its fast algorithm FastDTW are deployed in order to match similar patterns in reference and misaligned power consumption traces. Output of DTW - optimal path is then used for the alignment process. Aligned traces are used for further processing and evaluation of the DPA attack. The result is successful DPA attack on misaligned power consumption traces and recovery of the secret 128-bit key. Results are comparable with DPA attack using trigger to align power traces during measurement.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] The FPGA Implementations of AES Resistant to Differential Power Analysis
    Zou Cheng
    Zhang Peng
    Zhao Qiang
    ISTM/2009: 8TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, 2009, : 3396 - 3399
  • [22] Differential Power Analysis Attack and Countermeasures on MCrypton
    Wang, Sixiang
    Cui, Qi
    Gao, Xianwei
    Zhang, Lei
    Duan, Xiaoyi
    PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 167 - 172
  • [23] A True Random-Based Differential Power Analysis Countermeasure Circuit for an AES Engine
    Liu, Po-Chun
    Chang, Hsie-Chia
    Lee, Chen-Yi
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2012, 59 (02) : 103 - 107
  • [24] An AES smart card implementation resistant to power analysis attacks
    Herbst, Christoph
    Oswald, Elisabeth
    Mangard, Stefan
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2006, 3989 : 239 - 252
  • [25] Power analysis resistant AES implementation with instruction set extensions
    Tillich, Stefan
    Grossschaedl, Johann
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2007, PROCEEDINGS, 2007, 4727 : 303 - +
  • [26] Side-Channel Power Analysis of a GPU AES Implementation
    Luo, Chao
    Fei, Yunsi
    Luo, Pei
    Mukherjee, Saoni
    Kaeli, David
    2015 33RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2015, : 281 - 288
  • [27] Power Variance Analysis Breaks a Masked ASIC Implementation of AES
    Li, Yang
    Sakiyama, Kazuo
    Batina, Lejla
    Nakatsu, Daisuke
    Ohta, Kazuo
    2010 DESIGN, AUTOMATION & TEST IN EUROPE (DATE 2010), 2010, : 1059 - 1064
  • [28] Template Attack on Masking AES Based on Fault Sensitivity Analysis
    Wang, Qian
    Wang, An
    Wu, Liji
    Qu, Gang
    Zhang, Guoshuang
    2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2015, : 96 - 99
  • [29] Enhanced cache attack on AES applicable on ARM-based devices with new operating systems
    Esfahani, Mahdi
    Soleimany, Hadi
    Aref, Mohammad Reza
    COMPUTER NETWORKS, 2021, 198
  • [30] Research on Time Randomization of AES against Differential Power Analysis
    Yang, Weiming
    Xu, Jinhui
    Yan, Yingjian
    Liu, Kai
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 2, PROCEEDINGS, 2009, : 536 - 539