An Investigation through Different B its Leakage in Power Analysis Attacks

سال انتشار: 1386
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 1,981

فایل این مقاله در 6 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ISCC04_038

تاریخ نمایه سازی: 10 اسفند 1385

چکیده مقاله:

Since the introduction of side-channel attacks, cryptographic devices are highly susceptible to power and electromagnetic analysis attacks, because these attacks require only relatively inexpensive equipments. Unless adequate countermeasures are implemented, side channel attacks allow an unauthorized person to reveal the private key of a cryptographic module. For attackers it is really prominent to attack a module with less number of measurements. Choosing an appropriate intermediate result is often of high importance and enables them to reveal the secret key with less number of measurements and in a short duration of time. In this paper a differential power analysis attack on different bits of an intermediate result on software implementation of AES- 128 on an 8051-compatible microcontroller has been carried out. The results show that specific bits leak information that is detectable with given 200 measurements. The other bits do not leak enough information that could be exploitable with 200 measurements in this particular attack. Consequently attackers should be aware that different bits in the same register in a processor leak different amount of information.

کلیدواژه ها:

Side Channel Attacks ، Diferential Power Analysis Attack ، Cryptographic Processors ، Intermediate Result

نویسندگان

Ehsan Rahimi

Electrical Engineering Department, Iran University of Science & Technology, Tehran, Iran

Ali Sadr

Electrical Engineering Department, Iran University of Science & Technology, Tehran, Iran