首页    期刊浏览 2024年10月03日 星期四
登录注册

文章基本信息

  • 标题:Power-based Side-Channel Analysis Against AES Implementations: Evaluation and Comparison
  • 本地全文:下载
  • 作者:Noura Benhadjyoussef ; Mouna Karmani ; Mohsen Machhout
  • 期刊名称:International Journal of Computer Science and Network Security
  • 印刷版ISSN:1738-7906
  • 出版年度:2021
  • 卷号:21
  • 期号:4
  • 页码:264-271
  • DOI:10.22937/IJCSNS.2021.21.4.32
  • 出版社:International Journal of Computer Science and Network Security
  • 摘要:From an information security perspective, protecting sensitive data requires utilizing algorithms which resist theoretical attacks. However, treating an algorithm in a purely mathematical fashion or in other words abstracting away from its physical (hardware or software) implementation opens the door to various real-world security threats. In the modern age of electronics, cryptanalysis attempts to reveal secret information based on cryptosystem physical properties, rather than exploiting the theoretical weaknesses in the implemented cryptographic algorithm. The correlation power attack (CPA) is a Side-Channel Analysis attack used to reveal sensitive information based on the power leakages of a device. In this paper, we present a power Hacking technique to demonstrate how a power analysis can be exploited to reveal the secret information in AES crypto-core. In the proposed case study, we explain the main techniques that can break the security of the considered crypto-core by using CPA attack. Using two cryptographic devices, FPGA and 8051 microcontrollers, the experimental attack procedure shows that the AES hardware implementation has better resistance against power attack compared to the software one. On the other hand, we remark that the efficiency of CPA attack depends statistically on the implementation and the power model used for the power prediction.
  • 关键词:Power analysis (CPA); Advanced Encryption Standard (AES); correlation coefficient; power model; AES implementation.
国家哲学社会科学文献中心版权所有