Implementation of Power Analysis Attack and Countermeasure
碩士 === 輔仁大學 === 電子工程學系 === 98 === Embedded systems such as smart- and sim- cards use cryptographic algorithms to protect information security. The power consumption of executing a cryptographic program is correlated with the secret key and intermediate data. The Differential Power Analysis (DPA) att...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/34237553960592072646 |
id |
ndltd-TW-098FJU00428040 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-098FJU004280402015-10-13T18:20:58Z http://ndltd.ncl.edu.tw/handle/34237553960592072646 Implementation of Power Analysis Attack and Countermeasure 電力分析攻擊與防禦之實作 Yang-Cheng Chuang 莊揚程 碩士 輔仁大學 電子工程學系 98 Embedded systems such as smart- and sim- cards use cryptographic algorithms to protect information security. The power consumption of executing a cryptographic program is correlated with the secret key and intermediate data. The Differential Power Analysis (DPA) attack collects power consumption traces and uses statistical analysis to find the key. This attack has been considered as the most dangerous attack to the security of cryptographic embedded systems. In this work, DPA attack was implemented and used to successfully attack an AES program running on an 8051-microprossor. A user-friendly interface was built to allow users conveniently simulating the DPA attacks. In our experiment, the total 128 bits of an AES secret key can be revealed within 12 minutes using our attacking platform. We also compared the efficiency between the two analyzing techniques, correlation coefficient and difference of mean. Furthermore, a countermeasure against DPA is proposed and implemented in an AES encryption program. The experimental result shows that the countermeasure significantly increases the resistance to DPA attacks. Kuan-Jen Lin 林寬仁 2010 學位論文 ; thesis 68 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 輔仁大學 === 電子工程學系 === 98 === Embedded systems such as smart- and sim- cards use cryptographic algorithms to protect information security. The power consumption of executing a cryptographic program is correlated with the secret key and intermediate data. The Differential Power Analysis (DPA) attack collects power consumption traces and uses statistical analysis to find the key. This attack has been considered as the most dangerous attack to the security of cryptographic embedded systems. In this work, DPA attack was implemented and used to successfully attack an AES program running on an 8051-microprossor. A user-friendly interface was built to allow users conveniently simulating the DPA attacks. In our experiment, the total 128 bits of an AES secret key can be revealed within 12 minutes using our attacking platform. We also compared the efficiency between the two analyzing techniques, correlation coefficient and difference of mean. Furthermore, a countermeasure against DPA is proposed and implemented in an AES encryption program. The experimental result shows that the countermeasure significantly increases the resistance to DPA attacks.
|
author2 |
Kuan-Jen Lin |
author_facet |
Kuan-Jen Lin Yang-Cheng Chuang 莊揚程 |
author |
Yang-Cheng Chuang 莊揚程 |
spellingShingle |
Yang-Cheng Chuang 莊揚程 Implementation of Power Analysis Attack and Countermeasure |
author_sort |
Yang-Cheng Chuang |
title |
Implementation of Power Analysis Attack and Countermeasure |
title_short |
Implementation of Power Analysis Attack and Countermeasure |
title_full |
Implementation of Power Analysis Attack and Countermeasure |
title_fullStr |
Implementation of Power Analysis Attack and Countermeasure |
title_full_unstemmed |
Implementation of Power Analysis Attack and Countermeasure |
title_sort |
implementation of power analysis attack and countermeasure |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/34237553960592072646 |
work_keys_str_mv |
AT yangchengchuang implementationofpoweranalysisattackandcountermeasure AT zhuāngyángchéng implementationofpoweranalysisattackandcountermeasure AT yangchengchuang diànlìfēnxīgōngjīyǔfángyùzhīshízuò AT zhuāngyángchéng diànlìfēnxīgōngjīyǔfángyùzhīshízuò |
_version_ |
1718030356227031040 |