{"title":"Power Side Channel Attack of AES FPGA Implementation with Experimental Results using Full Keys","authors":"Aurelien T. Mozipo, J. Acken","doi":"10.1109/DTS52014.2021.9497976","DOIUrl":null,"url":null,"abstract":"The ability to attack Advanced Encryption Standard (AES) algorithms in the last round has been shown to be possible by enumerating the key guesses one byte at a time. However, attacking the first round does not lend itself to such a technique because of the presence of the mix-column layer. We demonstrate an attack on the 1st round of AES encryption by defining a leakage function based on the full key, and then we apply correlation power analysis to successfully uncover the encryption key. The success rate, defined by the Euclidian distance fluctuation is 0.788, which is higher than similar applications in the current literature. We also introduce the concept of Kullback-Leibler entropy as a distinguisher for discriminating between the power measurements and the estimated power of the key guesses. We demonstrate this as a new way of reducing the key search space via key ranking with applications for power side-channel attacks on the implementations of AES algorithms in an FPGA.","PeriodicalId":158426,"journal":{"name":"2021 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DTS52014.2021.9497976","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The ability to attack Advanced Encryption Standard (AES) algorithms in the last round has been shown to be possible by enumerating the key guesses one byte at a time. However, attacking the first round does not lend itself to such a technique because of the presence of the mix-column layer. We demonstrate an attack on the 1st round of AES encryption by defining a leakage function based on the full key, and then we apply correlation power analysis to successfully uncover the encryption key. The success rate, defined by the Euclidian distance fluctuation is 0.788, which is higher than similar applications in the current literature. We also introduce the concept of Kullback-Leibler entropy as a distinguisher for discriminating between the power measurements and the estimated power of the key guesses. We demonstrate this as a new way of reducing the key search space via key ranking with applications for power side-channel attacks on the implementations of AES algorithms in an FPGA.