Differential Power Analysis of an AES Implementation

نویسندگان

  • Andreas Schuster
  • Elisabeth Oswald
چکیده

The AES is still the ”State of the Art” cryptographic algorithm, and power analysis attacks had shown that breaking traditionally said high secure ciphers (like AES) is done with a relative low effort. This paper describes how to perform such an attack on an AES implementation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

A Novel and Highly Efficient AES Implementation Robust against Differential Power Analysis

Developed by Paul Kocher, Joshua Jaffe, and Benjamin Jun in 1999, Differential Power Analysis (DPA) represents a unique and powerful cryptanalysis technique. Insight into the encryption and decryption behavior of a cryptographic device can be determined by examining its electrical power signature. This paper describes a novel approach for implementation of the AES algorithm which provides a sig...

متن کامل

An Improved AES Masking Method Smartcard Implementation for Resisting DPA Attacks

To improve the DPA (Differential Power Analysis) resistance of a cryptographic device such as a smartcard and facilitate the implementation of hardware, the paper proposes an improved masking method on AES for resisting DPA. The paper uses a multiplicative inversion in finite field GF (2^4) instead of GF (2^8) to reduce the complexity of the operation. The key of the presented method is to make...

متن کامل

Multilateral White-Box Cryptanalysis: Case study on WB-AES of CHES Challenge 2016

The security requirement of white-box cryptography (WBC) is that it should protect the secret key from a white-box security model that permits an adversary who is able to entirely control the execution of the cryptographic algorithm and its environment. It has already been demonstrated that most of the WBCs are vulnerable to algebraic attacks from a white-box security perspective. Recently, a n...

متن کامل

Multilateral White-Box Cryptanalysis

Security requirement of White-Box Cryptography (WBC) is that it should protect secret key from white-box security model permits an adversary who is able to entirely control execution of the cryptographic algorithm and its environment. It has already been demonstrated that most of the primitive is vulnerable to algebraic attacks in the white-box security perspective. In recently, a new Different...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004