On the Application of Isomorphic Composite Fields for AES against Differential Power Analysis

碩士 === 國立成功大學 === 電機工程學系碩博士班 === 95 === Since Paul Kocher proved that side-channel attack (SCA) efficiently break Data Encryption Standard (DES) in 1996, many cryptosystem designers have not only focused on the mathematic security but also concerned about its hardware implementation security of cryp...

Full description

Bibliographic Details
Main Authors: Sue-Jing Huang, 黃淑菁
Other Authors: Ming-Der Shieh
Format: Others
Language:zh-TW
Published: 2007
Online Access:http://ndltd.ncl.edu.tw/handle/11403239385108916427
id ndltd-TW-095NCKU5442160
record_format oai_dc
spelling ndltd-TW-095NCKU54421602015-10-13T13:59:58Z http://ndltd.ncl.edu.tw/handle/11403239385108916427 On the Application of Isomorphic Composite Fields for AES against Differential Power Analysis 應用同構合成場於AES以抵禦差分電力攻擊之研究 Sue-Jing Huang 黃淑菁 碩士 國立成功大學 電機工程學系碩博士班 95 Since Paul Kocher proved that side-channel attack (SCA) efficiently break Data Encryption Standard (DES) in 1996, many cryptosystem designers have not only focused on the mathematic security but also concerned about its hardware implementation security of cryptography. In 2001, National Institute of Standard and Technology (NIST) announced the new generation Advanced Encryption Standard (AES) which is also threatened under side-channel attack. Differential power analysis (DPA) involves the leaked power information to deduce the secret key during the execution of the algorithm. When the power consumption depends on processed data which covers a part of the secret key, the correlation exists between Hamming weight of the intermediate values and power consumption. In contrast to the countermeasures on a microprocessor, our thesis focuses on AES architecture against DPA for ASIC implementation view point. During encryption, the attacker observes the power consumption of the register to predict the intermediate values, so we propose a countermeasure against DPA by randomly generating a composite field to compute S-box. Assume that attacker does not know which the composite field is used, and then the useful information can not be obtained from power. Hence, we achieve the purpose of randomizing intermediate values. In other words, while we reduce the correlation between power consumption and intermediate values, the security of cryptosystem is increased. Ming-Der Shieh 謝明得 2007 學位論文 ; thesis 68 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立成功大學 === 電機工程學系碩博士班 === 95 === Since Paul Kocher proved that side-channel attack (SCA) efficiently break Data Encryption Standard (DES) in 1996, many cryptosystem designers have not only focused on the mathematic security but also concerned about its hardware implementation security of cryptography. In 2001, National Institute of Standard and Technology (NIST) announced the new generation Advanced Encryption Standard (AES) which is also threatened under side-channel attack. Differential power analysis (DPA) involves the leaked power information to deduce the secret key during the execution of the algorithm. When the power consumption depends on processed data which covers a part of the secret key, the correlation exists between Hamming weight of the intermediate values and power consumption. In contrast to the countermeasures on a microprocessor, our thesis focuses on AES architecture against DPA for ASIC implementation view point. During encryption, the attacker observes the power consumption of the register to predict the intermediate values, so we propose a countermeasure against DPA by randomly generating a composite field to compute S-box. Assume that attacker does not know which the composite field is used, and then the useful information can not be obtained from power. Hence, we achieve the purpose of randomizing intermediate values. In other words, while we reduce the correlation between power consumption and intermediate values, the security of cryptosystem is increased.
author2 Ming-Der Shieh
author_facet Ming-Der Shieh
Sue-Jing Huang
黃淑菁
author Sue-Jing Huang
黃淑菁
spellingShingle Sue-Jing Huang
黃淑菁
On the Application of Isomorphic Composite Fields for AES against Differential Power Analysis
author_sort Sue-Jing Huang
title On the Application of Isomorphic Composite Fields for AES against Differential Power Analysis
title_short On the Application of Isomorphic Composite Fields for AES against Differential Power Analysis
title_full On the Application of Isomorphic Composite Fields for AES against Differential Power Analysis
title_fullStr On the Application of Isomorphic Composite Fields for AES against Differential Power Analysis
title_full_unstemmed On the Application of Isomorphic Composite Fields for AES against Differential Power Analysis
title_sort on the application of isomorphic composite fields for aes against differential power analysis
publishDate 2007
url http://ndltd.ncl.edu.tw/handle/11403239385108916427
work_keys_str_mv AT suejinghuang ontheapplicationofisomorphiccompositefieldsforaesagainstdifferentialpoweranalysis
AT huángshūjīng ontheapplicationofisomorphiccompositefieldsforaesagainstdifferentialpoweranalysis
AT suejinghuang yīngyòngtónggòuhéchéngchǎngyúaesyǐdǐyùchàfēndiànlìgōngjīzhīyánjiū
AT huángshūjīng yīngyòngtónggòuhéchéngchǎngyúaesyǐdǐyùchàfēndiànlìgōngjīzhīyánjiū
_version_ 1717747401020669952