Power-analysis attack on an ASIC AES implementation

被引:100
|
作者
Örs, SB [1 ]
Gürkaynak, F [1 ]
Oswald, E [1 ]
Preneel, B [1 ]
机构
[1] Katholieke Univ Leuven, Dept ESAT SCD COSIC, B-3001 Heverlee, Belgium
关键词
AES; power analysis attack;
D O I
10.1109/ITCC.2004.1286711
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The AES (Advanced Encryption Standard) is a new block cipher standard published by the US government in November 2001. As a consequence, there is a growing interest in efficient implementations of the AES. For many applications, these implementations need to be resistant against side channel attacks, that is, it should not be too easy to extract secret information from physical measurements on the device. This article presents the first results on the feasibility of power analysis attack against an AES hardware implementation. Our attack is targeted against an ASIC implementation of the AES developed by the ETH Zurich. We show how to build a reliable measurement setup and how to improve the correlation coefficients, i.e., the signal to noise ratio for our measurements. Our approach is also the first step to link a behavior HDL simulator generated simulated power measurements to real power measurements.
引用
收藏
页码:546 / 552
页数:7
相关论文
共 50 条
  • [21] Differential fault analysis attack-tolerant hardware implementation of AES
    Anit Kumar Ghosal
    Amit Sardar
    Dipanwita Roy Chowdhury
    The Journal of Supercomputing, 2024, 80 : 4648 - 4681
  • [22] Attack on AES Encryption Microcontroller Devices With Correlation Power Analysis
    Nuradha, Faisal Rahman
    Putra, Septafiansyah Dwi
    Kurniawan, Yusuf
    Rizqulloh, Muhammad Adli
    2019 INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND SMART DEVICES (ISESD 2019): FUTURE SMART DEVICES AND NANOTECHNOLOGY FOR MICROELECTRONICS, 2019,
  • [23] Differential fault analysis attack-tolerant hardware implementation of AES
    Ghosal, Anit Kumar
    Sardar, Amit
    Chowdhury, Dipanwita Roy
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (04): : 4648 - 4681
  • [24] One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores
    Moradi, Amir
    Mischke, Oliver
    Paar, Christof
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (09) : 1786 - 1798
  • [25] Differential Power Analysis of AES ASIC Implementations with Various S-box Circuits
    Sugawara, Takeshi
    Homma, Naofumi
    Aoki, Takafumi
    Satoh, Akashi
    2009 EUROPEAN CONFERENCE ON CIRCUIT THEORY AND DESIGN, VOLS 1 AND 2, 2009, : 395 - +
  • [26] Power-analysis tool targets PCBs and MCMs
    Donlin, M
    COMPUTER DESIGN, 1996, 35 (07): : 16 - 16
  • [27] Low Power ECC Implementation on ASIC
    Van-Lan Dao
    Van-Tinh Nguyen
    Van-Phuc Hoang
    ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY, 2017, 538 : 332 - 339
  • [28] An ASIC Implementation of Low Area AES Encryption Core for Wireless Networks
    Van-Lan Dao
    Anh-Thai Nguyen
    Van-Phuc Hoang
    Tuan-Anh Tran
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, MANAGEMENT AND TELECOMMUNICATIONS (COMMANTEL), 2015, : 99 - 102
  • [29] An AES smart card implementation resistant to power analysis attacks
    Herbst, Christoph
    Oswald, Elisabeth
    Mangard, Stefan
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2006, 3989 : 239 - 252
  • [30] Power analysis resistant AES implementation with instruction set extensions
    Tillich, Stefan
    Grossschaedl, Johann
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2007, PROCEEDINGS, 2007, 4727 : 303 - +