Differential Power Analysis on AES Chip with Hamming-distance and Toggle-count Model

碩士 === 國立交通大學 === 電子研究所 === 99 === In our daily life, the applications of internet and 3C products are used more frequently. The secret information is transported through these applications. In order to ensure the information security, some cryptographic systems have been adopted widely. Cryptograph...

Full description

Bibliographic Details
Main Authors: Wei, Ting-Yu, 魏廷聿
Other Authors: Chang, Hsie-Chia
Format: Others
Language:en_US
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/40252213398761249275
id ndltd-TW-099NCTU5428033
record_format oai_dc
spelling ndltd-TW-099NCTU54280332016-04-18T04:21:38Z http://ndltd.ncl.edu.tw/handle/40252213398761249275 Differential Power Analysis on AES Chip with Hamming-distance and Toggle-count Model 基於漢明差值與觸動計數模型之差分能量分析與實作-以AES晶片為例 Wei, Ting-Yu 魏廷聿 碩士 國立交通大學 電子研究所 99 In our daily life, the applications of internet and 3C products are used more frequently. The secret information is transported through these applications. In order to ensure the information security, some cryptographic systems have been adopted widely. Cryptographic system indeed can provide the security. However, no one can ensure that cryptographic system can absolutely protect the information security. Differential power analysis (DPA) attack is one of the threats [11] that could reveal the secret in the cryptographic system. The main efficiency of DPA attack is depended on the power model of attack method. Getting suitable power model, it could cost less time to finish the attack. This thesis describes differential power analysis attack with two kinds of power models on an Advanced Encryption Standard (AES) chip fabricated in 90nm CMOS. One kind of power model is Hamming-Distance model that calculates the relationship between input and output of S-box. The differential power analysis attack with the Hamming-distance model can attack the AES chip based on look-up-table S-box successfully. But according to the experiment results, it cannot attack the AES chip based on composite-field S-box successfully. So, other power model should substitute for the Hamming-distance model to complete the DPA attack. The substitute power model is toggle-count model that get the statistics of the switching activities from the logic gates during the S-Box process. Chang, Hsie-Chia Hwang, Wei 張錫嘉 黃威 2010 學位論文 ; thesis 48 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立交通大學 === 電子研究所 === 99 === In our daily life, the applications of internet and 3C products are used more frequently. The secret information is transported through these applications. In order to ensure the information security, some cryptographic systems have been adopted widely. Cryptographic system indeed can provide the security. However, no one can ensure that cryptographic system can absolutely protect the information security. Differential power analysis (DPA) attack is one of the threats [11] that could reveal the secret in the cryptographic system. The main efficiency of DPA attack is depended on the power model of attack method. Getting suitable power model, it could cost less time to finish the attack. This thesis describes differential power analysis attack with two kinds of power models on an Advanced Encryption Standard (AES) chip fabricated in 90nm CMOS. One kind of power model is Hamming-Distance model that calculates the relationship between input and output of S-box. The differential power analysis attack with the Hamming-distance model can attack the AES chip based on look-up-table S-box successfully. But according to the experiment results, it cannot attack the AES chip based on composite-field S-box successfully. So, other power model should substitute for the Hamming-distance model to complete the DPA attack. The substitute power model is toggle-count model that get the statistics of the switching activities from the logic gates during the S-Box process.
author2 Chang, Hsie-Chia
author_facet Chang, Hsie-Chia
Wei, Ting-Yu
魏廷聿
author Wei, Ting-Yu
魏廷聿
spellingShingle Wei, Ting-Yu
魏廷聿
Differential Power Analysis on AES Chip with Hamming-distance and Toggle-count Model
author_sort Wei, Ting-Yu
title Differential Power Analysis on AES Chip with Hamming-distance and Toggle-count Model
title_short Differential Power Analysis on AES Chip with Hamming-distance and Toggle-count Model
title_full Differential Power Analysis on AES Chip with Hamming-distance and Toggle-count Model
title_fullStr Differential Power Analysis on AES Chip with Hamming-distance and Toggle-count Model
title_full_unstemmed Differential Power Analysis on AES Chip with Hamming-distance and Toggle-count Model
title_sort differential power analysis on aes chip with hamming-distance and toggle-count model
publishDate 2010
url http://ndltd.ncl.edu.tw/handle/40252213398761249275
work_keys_str_mv AT weitingyu differentialpoweranalysisonaeschipwithhammingdistanceandtogglecountmodel
AT wèitíngyù differentialpoweranalysisonaeschipwithhammingdistanceandtogglecountmodel
AT weitingyu jīyúhànmíngchàzhíyǔchùdòngjìshùmóxíngzhīchàfēnnéngliàngfēnxīyǔshízuòyǐaesjīngpiànwèilì
AT wèitíngyù jīyúhànmíngchàzhíyǔchùdòngjìshùmóxíngzhīchàfēnnéngliàngfēnxīyǔshízuòyǐaesjīngpiànwèilì
_version_ 1718227077524619264