Differential Power Analysis on AES Chip with Hamming-distance and Toggle-count Model
碩士 === 國立交通大學 === 電子研究所 === 99 === In our daily life, the applications of internet and 3C products are used more frequently. The secret information is transported through these applications. In order to ensure the information security, some cryptographic systems have been adopted widely. Cryptograph...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/40252213398761249275 |
id |
ndltd-TW-099NCTU5428033 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099NCTU54280332016-04-18T04:21:38Z http://ndltd.ncl.edu.tw/handle/40252213398761249275 Differential Power Analysis on AES Chip with Hamming-distance and Toggle-count Model 基於漢明差值與觸動計數模型之差分能量分析與實作-以AES晶片為例 Wei, Ting-Yu 魏廷聿 碩士 國立交通大學 電子研究所 99 In our daily life, the applications of internet and 3C products are used more frequently. The secret information is transported through these applications. In order to ensure the information security, some cryptographic systems have been adopted widely. Cryptographic system indeed can provide the security. However, no one can ensure that cryptographic system can absolutely protect the information security. Differential power analysis (DPA) attack is one of the threats [11] that could reveal the secret in the cryptographic system. The main efficiency of DPA attack is depended on the power model of attack method. Getting suitable power model, it could cost less time to finish the attack. This thesis describes differential power analysis attack with two kinds of power models on an Advanced Encryption Standard (AES) chip fabricated in 90nm CMOS. One kind of power model is Hamming-Distance model that calculates the relationship between input and output of S-box. The differential power analysis attack with the Hamming-distance model can attack the AES chip based on look-up-table S-box successfully. But according to the experiment results, it cannot attack the AES chip based on composite-field S-box successfully. So, other power model should substitute for the Hamming-distance model to complete the DPA attack. The substitute power model is toggle-count model that get the statistics of the switching activities from the logic gates during the S-Box process. Chang, Hsie-Chia Hwang, Wei 張錫嘉 黃威 2010 學位論文 ; thesis 48 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立交通大學 === 電子研究所 === 99 === In our daily life, the applications of internet and 3C products are used more frequently. The secret information is transported through these applications. In order to ensure the information security, some cryptographic systems have been adopted widely. Cryptographic system indeed can provide the security. However, no one can ensure that cryptographic system can absolutely protect the information security.
Differential power analysis (DPA) attack is one of the threats [11] that could reveal the secret in the cryptographic system. The main efficiency of DPA attack is depended on the power model of attack method. Getting suitable power model, it could cost less time to finish the attack. This thesis describes differential power analysis attack with two kinds of power models on an Advanced Encryption Standard (AES) chip fabricated in 90nm CMOS. One kind of power model is Hamming-Distance model that calculates the relationship between input and output of S-box. The differential power analysis attack with the Hamming-distance model can attack the AES chip based on look-up-table S-box successfully. But according to the experiment results, it cannot attack the AES chip based on composite-field S-box successfully. So, other power model should substitute for the Hamming-distance model to complete the DPA attack. The substitute power model is toggle-count model that get the statistics of the switching activities from the logic gates during the S-Box process.
|
author2 |
Chang, Hsie-Chia |
author_facet |
Chang, Hsie-Chia Wei, Ting-Yu 魏廷聿 |
author |
Wei, Ting-Yu 魏廷聿 |
spellingShingle |
Wei, Ting-Yu 魏廷聿 Differential Power Analysis on AES Chip with Hamming-distance and Toggle-count Model |
author_sort |
Wei, Ting-Yu |
title |
Differential Power Analysis on AES Chip with Hamming-distance and Toggle-count Model |
title_short |
Differential Power Analysis on AES Chip with Hamming-distance and Toggle-count Model |
title_full |
Differential Power Analysis on AES Chip with Hamming-distance and Toggle-count Model |
title_fullStr |
Differential Power Analysis on AES Chip with Hamming-distance and Toggle-count Model |
title_full_unstemmed |
Differential Power Analysis on AES Chip with Hamming-distance and Toggle-count Model |
title_sort |
differential power analysis on aes chip with hamming-distance and toggle-count model |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/40252213398761249275 |
work_keys_str_mv |
AT weitingyu differentialpoweranalysisonaeschipwithhammingdistanceandtogglecountmodel AT wèitíngyù differentialpoweranalysisonaeschipwithhammingdistanceandtogglecountmodel AT weitingyu jīyúhànmíngchàzhíyǔchùdòngjìshùmóxíngzhīchàfēnnéngliàngfēnxīyǔshízuòyǐaesjīngpiànwèilì AT wèitíngyù jīyúhànmíngchàzhíyǔchùdòngjìshùmóxíngzhīchàfēnnéngliàngfēnxīyǔshízuòyǐaesjīngpiànwèilì |
_version_ |
1718227077524619264 |