TY - GEN
T1 - A CPA attack against cryptographic hardware implementation on SASEBO-GII
AU - Mestiri, Hassen
AU - Kahri, Fatma
AU - Bouallegue, Belgacem
AU - Machhout, Mohsen
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/10/11
Y1 - 2017/10/11
N2 - Cryptographic circuits are used in electronic devices to protect the confidential data. Those circuits store the encryption key to use in the cryptographic algorithms as the Advanced Encryption Standard algorithm (AES). The Correlation Power Analysis attack (CPA) is powerful cryptanalysis techniques that based on exploiting a linear relation between the real and predicted cryptographic circuits' power consumption. In this paper, we explain the CPA attack process against AES implemented on SASEBO-GII FPGA platform. The experimental results demonstrate that the CPA attack based on Hamming Weight power consumption model cannot extract the correct AES keys. However, the CPA based on Hamming Distance power consumption model can extract successfully all the encryption key bytes. In addition, the CPA attacks results show that using Hamming Distance, 100% of encryption key appears at about 4300 power traces.
AB - Cryptographic circuits are used in electronic devices to protect the confidential data. Those circuits store the encryption key to use in the cryptographic algorithms as the Advanced Encryption Standard algorithm (AES). The Correlation Power Analysis attack (CPA) is powerful cryptanalysis techniques that based on exploiting a linear relation between the real and predicted cryptographic circuits' power consumption. In this paper, we explain the CPA attack process against AES implemented on SASEBO-GII FPGA platform. The experimental results demonstrate that the CPA attack based on Hamming Weight power consumption model cannot extract the correct AES keys. However, the CPA based on Hamming Distance power consumption model can extract successfully all the encryption key bytes. In addition, the CPA attacks results show that using Hamming Distance, 100% of encryption key appears at about 4300 power traces.
KW - Advanced Encryption Standard (AES)
KW - Correlation Power Analysis (CPA)
KW - Hamming Distance model (HD)
KW - Side Channel Attacks (SCA)
UR - http://www.scopus.com/inward/record.url?scp=85034776084&partnerID=8YFLogxK
U2 - 10.1109/GECS.2017.8066139
DO - 10.1109/GECS.2017.8066139
M3 - Conference contribution
AN - SCOPUS:85034776084
T3 - International Conference on Green Energy and Conversion Systems, GECS 2017
BT - International Conference on Green Energy and Conversion Systems, GECS 2017
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2017 IEEE International Conference on Green Energy and Conversion Systems, GECS 2017
Y2 - 23 March 2017 through 25 March 2017
ER -