A CPA attack against cryptographic hardware implementation on SASEBO-GII

2017 International Conference on Green Energy Conversion Systems (GECS)(2017)

Cited 2|Views0
No score
Abstract
Cryptographic circuits are used in electronic devices to protect the confidential data. Those circuits store the encryption key to use in the cryptographic algorithms as the Advanced Encryption Standard algorithm (AES). The Correlation Power Analysis attack (CPA) is powerful cryptanalysis techniques that based on exploiting a linear relation between the real and predicted cryptographic circuits' power consumption. In this paper, we explain the CPA attack process against AES implemented on SASEBO-GII FPGA platform. The experimental results demonstrate that the CPA attack based on Hamming Weight power consumption model cannot extract the correct AES keys. However, the CPA based on Hamming Distance power consumption model can extract successfully all the encryption key bytes. In addition, the CPA attacks results show that using Hamming Distance, 100% of encryption key appears at about 4300 power traces.
More
Translated text
Key words
Side Channel Attacks (SCA),Correlation Power Analysis (CPA),Hamming Distance model (HD),Advanced Encryption Standard (AES)
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined