Power-analysis attack on an ASIC AES implementation

被引:106
作者
Örs, SB [1 ]
Gürkaynak, F [1 ]
Oswald, E [1 ]
Preneel, B [1 ]
机构
[1] Katholieke Univ Leuven, Dept ESAT SCD COSIC, B-3001 Heverlee, Belgium
来源
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS | 2004年
关键词
AES; power analysis attack;
D O I
10.1109/ITCC.2004.1286711
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The AES (Advanced Encryption Standard) is a new block cipher standard published by the US government in November 2001. As a consequence, there is a growing interest in efficient implementations of the AES. For many applications, these implementations need to be resistant against side channel attacks, that is, it should not be too easy to extract secret information from physical measurements on the device. This article presents the first results on the feasibility of power analysis attack against an AES hardware implementation. Our attack is targeted against an ASIC implementation of the AES developed by the ETH Zurich. We show how to build a reliable measurement setup and how to improve the correlation coefficients, i.e., the signal to noise ratio for our measurements. Our approach is also the first step to link a behavior HDL simulator generated simulated power measurements to real power measurements.
引用
收藏
页码:546 / 552
页数:7
相关论文
共 13 条
[1]  
Akkar M.-L., 2001, LECT NOTES COMPUTER, V2162, P309, DOI DOI 10.1007/3-540-44709-1_
[2]  
Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
[3]  
[Anonymous], 2001, 197 FIPS NAT I STAND
[4]  
[Anonymous], 463 FIPS NAT I STAND
[5]  
Biham E., 1999, P 2 ADV ENCR STAND A
[6]  
Chari S., 1999, LECT NOTES COMPUTER, V1666, P398, DOI [10.1007/3-540-48405-1_26, DOI 10.1007/3-540-48405-1_26]
[7]  
Daemen Joan, 2002, DESIGN RIJNDAEL AES
[8]  
Golic JD, 2002, LECT NOTES COMPUT SC, V2523, P198
[9]  
Kang S.-M., 2003, CMOS DIGITAL INTEGRA, V3rd
[10]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388