首页> 外文会议>Mediterranean Conference on Embedded Computing >Attacking AES implementations using correlation power analysis on ZYBO Zynq-7000 SoC board
【24h】

Attacking AES implementations using correlation power analysis on ZYBO Zynq-7000 SoC board

机译:在ZYBO Zynq-7000 SoC板上使用相关功率分析来攻击AES实现

获取原文

摘要

Differential power analysis (DPA) and its enhanced variant, correlation power analysis (CPA), are one of the most common side channel attacks today. A dedicated hardware platform is often used when performing this kind of attack for experimental purposes. In this paper, we present the modifications of a common ZYBO board, that are necessary to perform the CPA attack. We illustrate the whole process of attacking both software and hardware implementations of AES-128 and we present our experimental results.
机译:差分功率分析(DPA)及其增强的变体相关功率分析(CPA)是当今最常见的边信道攻击之一。当出于实验目的执行这种攻击时,通常使用专用的硬件平台。在本文中,我们介绍了常见的ZYBO板的修改,这些修改是执行CPA攻击所必需的。我们说明了攻击AES-128的软件和硬件实现的全过程,并提供了实验结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号