Differential Power Analysis of an AES Implementation
نویسندگان
چکیده
The AES is still the ”State of the Art” cryptographic algorithm, and power analysis attacks had shown that breaking traditionally said high secure ciphers (like AES) is done with a relative low effort. This paper describes how to perform such an attack on an AES implementation.
منابع مشابه
Differential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملA Novel and Highly Efficient AES Implementation Robust against Differential Power Analysis
Developed by Paul Kocher, Joshua Jaffe, and Benjamin Jun in 1999, Differential Power Analysis (DPA) represents a unique and powerful cryptanalysis technique. Insight into the encryption and decryption behavior of a cryptographic device can be determined by examining its electrical power signature. This paper describes a novel approach for implementation of the AES algorithm which provides a sig...
متن کاملAn Improved AES Masking Method Smartcard Implementation for Resisting DPA Attacks
To improve the DPA (Differential Power Analysis) resistance of a cryptographic device such as a smartcard and facilitate the implementation of hardware, the paper proposes an improved masking method on AES for resisting DPA. The paper uses a multiplicative inversion in finite field GF (2^4) instead of GF (2^8) to reduce the complexity of the operation. The key of the presented method is to make...
متن کاملMultilateral White-Box Cryptanalysis: Case study on WB-AES of CHES Challenge 2016
The security requirement of white-box cryptography (WBC) is that it should protect the secret key from a white-box security model that permits an adversary who is able to entirely control the execution of the cryptographic algorithm and its environment. It has already been demonstrated that most of the WBCs are vulnerable to algebraic attacks from a white-box security perspective. Recently, a n...
متن کاملMultilateral White-Box Cryptanalysis
Security requirement of White-Box Cryptography (WBC) is that it should protect secret key from white-box security model permits an adversary who is able to entirely control execution of the cryptographic algorithm and its environment. It has already been demonstrated that most of the primitive is vulnerable to algebraic attacks in the white-box security perspective. In recently, a new Different...
متن کامل