A CPA Attack against Cryptographic Hardware Implementation on SASEBO-GII

被引:0
作者
Mestiri, Hassen [1 ]
Kahri, Fatma [1 ]
Bouallegue, Belgacem [1 ]
Machhout, Mohsen [1 ]
机构
[1] Univ Monastir, Fac Sci Monastir, Elect & Microelect Lab, Monastir, Tunisia
来源
2017 INTERNATIONAL CONFERENCE ON GREEN ENERGY & CONVERSION SYSTEMS (GECS) | 2017年
关键词
Side Channel Attacks (SCA); Correlation Power Analysis (CPA); Hamming Distance model (HD); Advanced Encryption Standard (AES);
D O I
暂无
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Cryptographic circuits are used in electronic devices to protect the confidential data. Those circuits store the encryption key to use in the cryptographic algorithms as the Advanced Encryption Standard algorithm (AES). The Correlation Power Analysis attack (CPA) is powerful cryptanalysis techniques that based on exploiting a linear relation between the real and predicted cryptographic circuits' power consumption. In this paper, we explain the CPA attack process against AES implemented on SASEBO-GII FPGA platform. The experimental results demonstrate that the CPA attack based on Hamming Weight power consumption model cannot extract the correct AES keys. However, the CPA based on Hamming Distance power consumption model can extract successfully all the encryption key bytes. In addition, the CPA attacks results show that using Hamming Distance, 100% of encryption key appears at about 4300 power traces.
引用
收藏
页数:5
相关论文
empty
未找到相关数据