H. Mestiri, Fatma Kahri, B. Bouallegue, Mohsen Machhout
{"title":"A CPA attack against cryptographic hardware implementation on SASEBO-GII","authors":"H. Mestiri, Fatma Kahri, B. Bouallegue, Mohsen Machhout","doi":"10.1109/GECS.2017.8066139","DOIUrl":null,"url":null,"abstract":"Cryptographic circuits are used in electronic devices to protect the confidential data. Those circuits store the encryption key to use in the cryptographic algorithms as the Advanced Encryption Standard algorithm (AES). The Correlation Power Analysis attack (CPA) is powerful cryptanalysis techniques that based on exploiting a linear relation between the real and predicted cryptographic circuits' power consumption. In this paper, we explain the CPA attack process against AES implemented on SASEBO-GII FPGA platform. The experimental results demonstrate that the CPA attack based on Hamming Weight power consumption model cannot extract the correct AES keys. However, the CPA based on Hamming Distance power consumption model can extract successfully all the encryption key bytes. In addition, the CPA attacks results show that using Hamming Distance, 100% of encryption key appears at about 4300 power traces.","PeriodicalId":214657,"journal":{"name":"2017 International Conference on Green Energy Conversion Systems (GECS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Green Energy Conversion Systems (GECS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GECS.2017.8066139","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cryptographic circuits are used in electronic devices to protect the confidential data. Those circuits store the encryption key to use in the cryptographic algorithms as the Advanced Encryption Standard algorithm (AES). The Correlation Power Analysis attack (CPA) is powerful cryptanalysis techniques that based on exploiting a linear relation between the real and predicted cryptographic circuits' power consumption. In this paper, we explain the CPA attack process against AES implemented on SASEBO-GII FPGA platform. The experimental results demonstrate that the CPA attack based on Hamming Weight power consumption model cannot extract the correct AES keys. However, the CPA based on Hamming Distance power consumption model can extract successfully all the encryption key bytes. In addition, the CPA attacks results show that using Hamming Distance, 100% of encryption key appears at about 4300 power traces.