On the Application of Isomorphic Composite Fields for AES against Differential Power Analysis
碩士 === 國立成功大學 === 電機工程學系碩博士班 === 95 === Since Paul Kocher proved that side-channel attack (SCA) efficiently break Data Encryption Standard (DES) in 1996, many cryptosystem designers have not only focused on the mathematic security but also concerned about its hardware implementation security of cryp...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2007
|
Online Access: | http://ndltd.ncl.edu.tw/handle/11403239385108916427 |
id |
ndltd-TW-095NCKU5442160 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-095NCKU54421602015-10-13T13:59:58Z http://ndltd.ncl.edu.tw/handle/11403239385108916427 On the Application of Isomorphic Composite Fields for AES against Differential Power Analysis 應用同構合成場於AES以抵禦差分電力攻擊之研究 Sue-Jing Huang 黃淑菁 碩士 國立成功大學 電機工程學系碩博士班 95 Since Paul Kocher proved that side-channel attack (SCA) efficiently break Data Encryption Standard (DES) in 1996, many cryptosystem designers have not only focused on the mathematic security but also concerned about its hardware implementation security of cryptography. In 2001, National Institute of Standard and Technology (NIST) announced the new generation Advanced Encryption Standard (AES) which is also threatened under side-channel attack. Differential power analysis (DPA) involves the leaked power information to deduce the secret key during the execution of the algorithm. When the power consumption depends on processed data which covers a part of the secret key, the correlation exists between Hamming weight of the intermediate values and power consumption. In contrast to the countermeasures on a microprocessor, our thesis focuses on AES architecture against DPA for ASIC implementation view point. During encryption, the attacker observes the power consumption of the register to predict the intermediate values, so we propose a countermeasure against DPA by randomly generating a composite field to compute S-box. Assume that attacker does not know which the composite field is used, and then the useful information can not be obtained from power. Hence, we achieve the purpose of randomizing intermediate values. In other words, while we reduce the correlation between power consumption and intermediate values, the security of cryptosystem is increased. Ming-Der Shieh 謝明得 2007 學位論文 ; thesis 68 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立成功大學 === 電機工程學系碩博士班 === 95 === Since Paul Kocher proved that side-channel attack (SCA) efficiently break Data Encryption Standard (DES) in 1996, many cryptosystem designers have not only focused on the mathematic security but also concerned about its hardware implementation security of cryptography. In 2001, National Institute of Standard and Technology (NIST) announced the new generation Advanced Encryption Standard (AES) which is also threatened under side-channel attack. Differential power analysis (DPA) involves the leaked power information to deduce the secret key during the execution of the algorithm. When the power consumption depends on processed data which covers a part of the secret key, the correlation exists between Hamming weight of the intermediate values and power consumption.
In contrast to the countermeasures on a microprocessor, our thesis focuses on AES architecture against DPA for ASIC implementation view point. During encryption, the attacker observes the power consumption of the register to predict the intermediate values, so we propose a countermeasure against DPA by randomly generating a composite field to compute S-box. Assume that attacker does not know which the composite field is used, and then the useful information can not be obtained from power. Hence, we achieve the purpose of randomizing intermediate values. In other words, while we reduce the correlation between power consumption and intermediate values, the security of cryptosystem is increased.
|
author2 |
Ming-Der Shieh |
author_facet |
Ming-Der Shieh Sue-Jing Huang 黃淑菁 |
author |
Sue-Jing Huang 黃淑菁 |
spellingShingle |
Sue-Jing Huang 黃淑菁 On the Application of Isomorphic Composite Fields for AES against Differential Power Analysis |
author_sort |
Sue-Jing Huang |
title |
On the Application of Isomorphic Composite Fields for AES against Differential Power Analysis |
title_short |
On the Application of Isomorphic Composite Fields for AES against Differential Power Analysis |
title_full |
On the Application of Isomorphic Composite Fields for AES against Differential Power Analysis |
title_fullStr |
On the Application of Isomorphic Composite Fields for AES against Differential Power Analysis |
title_full_unstemmed |
On the Application of Isomorphic Composite Fields for AES against Differential Power Analysis |
title_sort |
on the application of isomorphic composite fields for aes against differential power analysis |
publishDate |
2007 |
url |
http://ndltd.ncl.edu.tw/handle/11403239385108916427 |
work_keys_str_mv |
AT suejinghuang ontheapplicationofisomorphiccompositefieldsforaesagainstdifferentialpoweranalysis AT huángshūjīng ontheapplicationofisomorphiccompositefieldsforaesagainstdifferentialpoweranalysis AT suejinghuang yīngyòngtónggòuhéchéngchǎngyúaesyǐdǐyùchàfēndiànlìgōngjīzhīyánjiū AT huángshūjīng yīngyòngtónggòuhéchéngchǎngyúaesyǐdǐyùchàfēndiànlìgōngjīzhīyánjiū |
_version_ |
1717747401020669952 |