Efficient DPA Attacks on AES Hardware Implementations

HTML  Download Download as PDF (Size: 334KB)  PP. 68-73  
DOI: 10.4236/ijcns.2008.11010    7,763 Downloads   16,693 Views  Citations

ABSTRACT

This paper presents an effective way to enhance power analysis attacks on AES hardware implementations. The proposed attack adopts hamming difference of intermediate results as power mode. It arranges plaintext inputs to differentiate power traces to the maximal probability. A simulation-based AES ASIC implementation and experimental platform are built. Various power attacks are conducted on our AES hardware implementation. Unlike on software implementations, conventional power attacks on hardware implementations may not succeed or require more computations. However, the method we proposed effectively improves the success rate using acceptable number of power traces and fewer computations. Furthermore from experimental data, the correlation factor between the hamming distance of key guesses and the difference of DPA traces has the value 0.9233 to validate power model and attack results.

Share and Cite:

HAN, Y. , ZOU, X. , LIU, Z. and CHEN, Y. (2008) Efficient DPA Attacks on AES Hardware Implementations. International Journal of Communications, Network and System Sciences, 1, 68-73. doi: 10.4236/ijcns.2008.11010.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.