Differential Power Analysis of Advanced Encryption Standard on Accelerated 8051 Processor

被引:0
作者
Petrvalsky, Martin [1 ]
Drutarovsky, Milos [1 ]
Varchola, Michal
机构
[1] Tech Univ Kosice, Dept Elect & Multimedia Commun, Kosice, Slovakia
来源
2013 23RD INTERNATIONAL CONFERENCE RADIOELEKTRONIKA (RADIOELEKTRONIKA) | 2013年
关键词
Differential Power Analysis; power consumption model; accelerated; 8051; processor; traces alignment; Advanced Encryption Standard;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents implementation details of Differential Power Analysis (DPA) attack on accelerated 8051-based microcontroller with Advanced Encryption Standard (AES) algorithm. It also mentions differences between accelerated and regular 8051 cores from DPA point of view. DPA attack is performed on the devices by measuring their instantaneous power consumption during AES encipher process. Correlation analysis of precomputed and measured data can reveal secret key used by AES algorithm. Modification of measurement process and statistical evaluation algorithms improves results of the attack. Main results of this paper are working DPA attacks on accelerated 8051-based microcontroller, differences in power consumption models between common and accelerated 8051 cores, comparison of different measure points, methods for finding power model consumption, automated measurement of the traces and improved algorithm of correlation analysis. These results can be used to protect future implementations against DPA attacks.
引用
收藏
页码:334 / 339
页数:6
相关论文
共 12 条
  • [1] Agilent Technologies, 2013, DSO9404A DAT PROD IN
  • [2] Aigner M., 2000, Power Analysis Tutorial
  • [3] Analog Devices, 2013, ADUC842 DAT PROD INF
  • [4] Analog Devices, 2013, ADUC836 DAT PROD INF
  • [5] Barenghi Alessandro., 2010, P 3 INT C SECURITY I, P124, DOI [10.1145/1854099.1854126, DOI 10.1145/1854099.1854126]
  • [6] Correlation power analysis with a leakage model
    Brier, E
    Clavier, C
    Olivier, F
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 16 - 29
  • [7] Courtois N. T., 2006, ONL P DAGST SEM SYMM, P7
  • [8] Daemen Joan, 2020, Information Security and Cryptography, V2nd
  • [9] EFTON, 2013, 8051 COMP WEBP EFTON
  • [10] Intel, 1994, MCS51 MICR FAM US MA