首页> 外文会议>International Conference on Artificial Intelligence and Pattern Recognition >Vulnerability of advanced encryption standard algorithm to differential power analysis attacks implemented on ATmega-128 microcontroller
【24h】

Vulnerability of advanced encryption standard algorithm to differential power analysis attacks implemented on ATmega-128 microcontroller

机译:高级加密标准算法在ATMEGA-128微控制器上实现的差分功率分析攻击的漏洞

获取原文

摘要

A wide variety of cryptographic embedded devices including smartcards, ASICs and FPGAs must be secure against breaking in. However, these devices are vulnerable to side channel attacks. A side channel attack uses physical attributes such as differences in the power consumption measured from the physical implementation of the cryptosystem while it is performing cryptographic operations to determine the secret key of the device. This paper investigates the vulnerability of 128-bits advanced encryption standard(AES) cryptographic algorithm implementation in a microcontroller crypto-device against differential power analysis (DPA) attacks. ChipWhisperer capture hardware Rev2 tool was used to collect 1000 power traces for DPA. We observed and measured the behaviour of the power consumption of the microcontroller while it was encrypting 1000 randomly generated plaintexts using the same secret key throughout. Our attack was successful in revealing all the 16 bytes (128-bits) of the secret key and the results demonstrated that the AES implementation can be broken using 1000 encryption operations.
机译:包括智能卡,ASIC和FPGA在内的各种加密嵌入式设备必须安全地免于破坏。但是,这些设备容易受到侧频攻击的影响。侧频攻击使用从密码系统的物理实现中测量的功耗的物理属性,而在执行加密操作以确定设备的密钥。本文调查了128位高级加密标准(AES)加密算法在微控制器加密设备中实现了差分功率分析(DPA)攻击的漏洞。 ChipWhiser捕获硬件Rev2工具用于为DPA收集1000个电源迹线。我们观察并测量了微控制器的功耗的行为,而在整个密钥中加密1000随机生成的明文。我们的攻击成功地揭示了秘密密钥的所有16个字节(128位),结果表明AES实现可以使用1000个加密操作打破。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号