Implementation of Power Analysis Attack and Countermeasure

碩士 === 輔仁大學 === 電子工程學系 === 98 === Embedded systems such as smart- and sim- cards use cryptographic algorithms to protect information security. The power consumption of executing a cryptographic program is correlated with the secret key and intermediate data. The Differential Power Analysis (DPA) att...

Full description

Bibliographic Details
Main Authors: Yang-Cheng Chuang, 莊揚程
Other Authors: Kuan-Jen Lin
Format: Others
Language:zh-TW
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/34237553960592072646
id ndltd-TW-098FJU00428040
record_format oai_dc
spelling ndltd-TW-098FJU004280402015-10-13T18:20:58Z http://ndltd.ncl.edu.tw/handle/34237553960592072646 Implementation of Power Analysis Attack and Countermeasure 電力分析攻擊與防禦之實作 Yang-Cheng Chuang 莊揚程 碩士 輔仁大學 電子工程學系 98 Embedded systems such as smart- and sim- cards use cryptographic algorithms to protect information security. The power consumption of executing a cryptographic program is correlated with the secret key and intermediate data. The Differential Power Analysis (DPA) attack collects power consumption traces and uses statistical analysis to find the key. This attack has been considered as the most dangerous attack to the security of cryptographic embedded systems. In this work, DPA attack was implemented and used to successfully attack an AES program running on an 8051-microprossor. A user-friendly interface was built to allow users conveniently simulating the DPA attacks. In our experiment, the total 128 bits of an AES secret key can be revealed within 12 minutes using our attacking platform. We also compared the efficiency between the two analyzing techniques, correlation coefficient and difference of mean. Furthermore, a countermeasure against DPA is proposed and implemented in an AES encryption program. The experimental result shows that the countermeasure significantly increases the resistance to DPA attacks. Kuan-Jen Lin 林寬仁 2010 學位論文 ; thesis 68 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 輔仁大學 === 電子工程學系 === 98 === Embedded systems such as smart- and sim- cards use cryptographic algorithms to protect information security. The power consumption of executing a cryptographic program is correlated with the secret key and intermediate data. The Differential Power Analysis (DPA) attack collects power consumption traces and uses statistical analysis to find the key. This attack has been considered as the most dangerous attack to the security of cryptographic embedded systems. In this work, DPA attack was implemented and used to successfully attack an AES program running on an 8051-microprossor. A user-friendly interface was built to allow users conveniently simulating the DPA attacks. In our experiment, the total 128 bits of an AES secret key can be revealed within 12 minutes using our attacking platform. We also compared the efficiency between the two analyzing techniques, correlation coefficient and difference of mean. Furthermore, a countermeasure against DPA is proposed and implemented in an AES encryption program. The experimental result shows that the countermeasure significantly increases the resistance to DPA attacks.
author2 Kuan-Jen Lin
author_facet Kuan-Jen Lin
Yang-Cheng Chuang
莊揚程
author Yang-Cheng Chuang
莊揚程
spellingShingle Yang-Cheng Chuang
莊揚程
Implementation of Power Analysis Attack and Countermeasure
author_sort Yang-Cheng Chuang
title Implementation of Power Analysis Attack and Countermeasure
title_short Implementation of Power Analysis Attack and Countermeasure
title_full Implementation of Power Analysis Attack and Countermeasure
title_fullStr Implementation of Power Analysis Attack and Countermeasure
title_full_unstemmed Implementation of Power Analysis Attack and Countermeasure
title_sort implementation of power analysis attack and countermeasure
publishDate 2010
url http://ndltd.ncl.edu.tw/handle/34237553960592072646
work_keys_str_mv AT yangchengchuang implementationofpoweranalysisattackandcountermeasure
AT zhuāngyángchéng implementationofpoweranalysisattackandcountermeasure
AT yangchengchuang diànlìfēnxīgōngjīyǔfángyùzhīshízuò
AT zhuāngyángchéng diànlìfēnxīgōngjīyǔfángyùzhīshízuò
_version_ 1718030356227031040