A Study of Mask Architecture on Composite-Dual AES to Resist DPA

碩士 === 國立成功大學 === 電腦與通信工程研究所 === 94 === NIST (National Institute of Standard Technology) selected Rijndael as the new Advanced Encryption Standard (AES) in 2001. Experts in every field try their best to introduce new style of attack to break AES standard. In hardware point of view, when hardware mod...

Full description

Bibliographic Details
Main Authors: Jiun-Liang Kuo, 郭俊良
Other Authors: Chi Sung Laih
Format: Others
Language:en_US
Published: 2006
Online Access:http://ndltd.ncl.edu.tw/handle/54339560700112875572
id ndltd-TW-094NCKU5652020
record_format oai_dc
spelling ndltd-TW-094NCKU56520202016-05-30T04:21:57Z http://ndltd.ncl.edu.tw/handle/54339560700112875572 A Study of Mask Architecture on Composite-Dual AES to Resist DPA 抵擋差分能量攻擊的遮罩架構於合成對偶AES之研究 Jiun-Liang Kuo 郭俊良 碩士 國立成功大學 電腦與通信工程研究所 94 NIST (National Institute of Standard Technology) selected Rijndael as the new Advanced Encryption Standard (AES) in 2001. Experts in every field try their best to introduce new style of attack to break AES standard. In hardware point of view, when hardware module is executed, it may reveal information indirectly about the cryptographic device due to many kinds of physical phenomena, like length of execution time, power consumption, and electromagnetic dissipations, etc. Using this kind of information to attack cryptographic device is called Side-Channel Attack (SCA). Therefore, even if one cryptographic algorithm is proved secure, it may reveal protected secret as a result of various implementation factors. An attacker can collect power curves dissipated by cryptographic device and analyze them. This kind of attack is called power attack and is proposed by Kocher in 1999. Therefore recently many papers are published to defend power attack. The most common method is to randomize intermediate value of each round, so that 'Mask' is discussed extensively. This kind of method is to conduct random number to what you want to hide. Thereby, attackers are not able to collect and analyze power curves, hence power attack will be useless. In this thesis, we will review power attack, implement Oswald's mask architecture based on the properties of Dual Cipher, and discuss whether it is better than Oswald's masking method. We will also analyze whether Dual AES combines mask may lead better security to defend power attack. Chi Sung Laih 賴溪松 2006 學位論文 ; thesis 82 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立成功大學 === 電腦與通信工程研究所 === 94 === NIST (National Institute of Standard Technology) selected Rijndael as the new Advanced Encryption Standard (AES) in 2001. Experts in every field try their best to introduce new style of attack to break AES standard. In hardware point of view, when hardware module is executed, it may reveal information indirectly about the cryptographic device due to many kinds of physical phenomena, like length of execution time, power consumption, and electromagnetic dissipations, etc. Using this kind of information to attack cryptographic device is called Side-Channel Attack (SCA). Therefore, even if one cryptographic algorithm is proved secure, it may reveal protected secret as a result of various implementation factors. An attacker can collect power curves dissipated by cryptographic device and analyze them. This kind of attack is called power attack and is proposed by Kocher in 1999. Therefore recently many papers are published to defend power attack. The most common method is to randomize intermediate value of each round, so that 'Mask' is discussed extensively. This kind of method is to conduct random number to what you want to hide. Thereby, attackers are not able to collect and analyze power curves, hence power attack will be useless. In this thesis, we will review power attack, implement Oswald's mask architecture based on the properties of Dual Cipher, and discuss whether it is better than Oswald's masking method. We will also analyze whether Dual AES combines mask may lead better security to defend power attack.
author2 Chi Sung Laih
author_facet Chi Sung Laih
Jiun-Liang Kuo
郭俊良
author Jiun-Liang Kuo
郭俊良
spellingShingle Jiun-Liang Kuo
郭俊良
A Study of Mask Architecture on Composite-Dual AES to Resist DPA
author_sort Jiun-Liang Kuo
title A Study of Mask Architecture on Composite-Dual AES to Resist DPA
title_short A Study of Mask Architecture on Composite-Dual AES to Resist DPA
title_full A Study of Mask Architecture on Composite-Dual AES to Resist DPA
title_fullStr A Study of Mask Architecture on Composite-Dual AES to Resist DPA
title_full_unstemmed A Study of Mask Architecture on Composite-Dual AES to Resist DPA
title_sort study of mask architecture on composite-dual aes to resist dpa
publishDate 2006
url http://ndltd.ncl.edu.tw/handle/54339560700112875572
work_keys_str_mv AT jiunliangkuo astudyofmaskarchitectureoncompositedualaestoresistdpa
AT guōjùnliáng astudyofmaskarchitectureoncompositedualaestoresistdpa
AT jiunliangkuo dǐdǎngchàfēnnéngliànggōngjīdezhēzhàojiàgòuyúhéchéngduìǒuaeszhīyánjiū
AT guōjùnliáng dǐdǎngchàfēnnéngliànggōngjīdezhēzhàojiàgòuyúhéchéngduìǒuaeszhīyánjiū
AT jiunliangkuo studyofmaskarchitectureoncompositedualaestoresistdpa
AT guōjùnliáng studyofmaskarchitectureoncompositedualaestoresistdpa
_version_ 1718285157664817152