Differential Power Analysis Attack on ARM based AES Implementation without Explicit Synchronization

被引:0
|
作者
Petrvalsky, Martin [1 ]
Drutarovsky, Milos [1 ]
Varchola, Michal [2 ]
机构
[1] Tech Univ Kosice, Dept Elect & Multimedia Commun, Kosice, Slovakia
[2] Tech Univ Kosice, Dept Elect & Multimedia Commun, ELIT Syst Sro, Kosice, Slovakia
关键词
Differential Power Analysis; ARM processor; AES; elastic alignment; Dynamic Time Warping;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents Differential Power Analysis (DPA) attack on 32-bit ARM Cortex-M3 microprocessor. Attacked algorithm is unprotected Advanced Encryption Standard (AES) with 128-bit key. DPA attack is deployed on the ARM processor by measuring its instantaneous power consumption during encryption algorithm. Analyzed power consumption traces obtained from the measurement are out-of-sync as they would be during the realistic DPA attack without using trigger to synchronize the traces. Unaligned traces or regular methods of static alignment are inappropriate for further analysis. In this paper elastic alignment methods are used for the trace synchronization. Dynamic Time Warping (DTW) and its fast algorithm FastDTW are deployed in order to match similar patterns in reference and misaligned power consumption traces. Output of DTW - optimal path is then used for the alignment process. Aligned traces are used for further processing and evaluation of the DPA attack. The result is successful DPA attack on misaligned power consumption traces and recovery of the secret 128-bit key. Results are comparable with DPA attack using trigger to align power traces during measurement.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Power Analysis Attack Based on Hamming Weight Model without Brute Force Cracking
    Fan, Xiaohong
    Tong, Jianmin
    Li, You
    Duan, Xiaoyi
    Ren, Yu
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [42] Two-dimensional parity-based concurrent error detection method for AES against differential fault attack and its VLSI implementation
    Zhao, Jia
    Han, Jun
    Zeng, Xiaoyang
    Han, Lin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2009, 46 (04): : 593 - 601
  • [43] A new and efficient approach to protect AES against differential power analysis
    Islamshahr Azad University, Islamshahr Branch, Iran
    不详
    World Congr. Internet Secur., WorldCIS, 1600, (59-66):
  • [45] Towards an AES crypto-chip resistant to differential power analysis
    Pramstaller, N
    Gürkaynak, FK
    Haene, S
    Kaeslin, H
    Felber, N
    Fichtner, W
    ESSCIRC 2004: PROCEEDINGS OF THE 30TH EUROPEAN SOLID-STATE CIRCUITS CONFERENCE, 2004, : 307 - 310
  • [46] Differential power analysis attacks against AES circuits implemented on a FPGA
    Iwai, Keisuke
    Sasaki, Minoru
    Kurokawa, Takakazu
    ICIW 2007: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 117 - 122
  • [47] An Extremely Light-Weight Countermeasure to Power Analysis Attack in Dedicated Circuit for AES
    Koyanagi, Yui
    Ukezono, Tomoaki
    2022 19TH INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2022, : 85 - 86
  • [48] Design Challenges for a Differential-Power-Analysis Aware GALS-based AES Crypto ASIC
    Gurkaynak, Frank K.
    Oetiker, Stephan
    Kaeslin, Hubert
    Felber, Norbert
    Fichtner, Wolfgang
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 146 (02) : 133 - 149
  • [49] Deep Learning-Based Power Analysis Attack for Extracting AES Keys on ATmega328P Microcontroller
    Ismail Negabi
    Smail Ait El Asri
    Samir El Adib
    Naoufal Raissouni
    Arabian Journal for Science and Engineering, 2024, 49 : 4197 - 4208
  • [50] Deep Learning-Based Power Analysis Attack for Extracting AES Keys on ATmega328P Microcontroller
    Negabi, Ismail
    Ait El Asri, Smail
    El Adib, Samir
    Raissouni, Naoufal
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (03) : 4197 - 4208