Font Size: a A A

Power Analysis Attacks Of Cryptographic Algorithms

Posted on:2012-06-10Degree:MasterType:Thesis
Country:ChinaCandidate:W X LiFull Text:PDF
GTID:2218330338962919Subject:Information security
Abstract/Summary:PDF Full Text Request
In the practical application of cryptographic algorithms, we often use cryptographic devices to implement them, by software or hardware. Cryptographic devices would yield informations that can be used to carry out power analysis, e.g. power consumption, electromagnetic radiation, temperature difference and so on. In addition, different operations often have different execution time. Such informations are often called Side-channel Information, and attacks using Side-channel Information are often called Side-channel Attack. Power Analysis Attack is the most discussed and most threatening Side-channel Attack. Power Analysis Attack exploits the fact:the instantaneous power consumption of cryptographic devices depends on the data values and operations of the devices.Rijndael algorithm was designed by Joan Daemen and Vincent Rijmen of Belgium, and it is iterative block cipher. In 2000, the National institute of Standards and Technology (NIST) chose the Rijndael algorithm as the Advanced Encryption Standard(AES), and adopted by the U.S. Department of Commence, replacing the Data Encryption Standard(DES).In this paper, we chose AES algorithm as the target algorithm, and carry out Power Analysis Attack to a special kind of hardware implementation of AES algorithm. This kind of hardware implementation of AES has a important feature:the input values and output values are storaged in the same register.Simple Power Analysis (SPA) and Differential Power Analysis (DPA) were proposed by Kocher et al. [6]. SPA is essentially a technique to guess the executed operations and date values of special time using power consumption measurements.In order to carry out SPA, attackers must know the Details of the implementation of cryptographic algorithms. DPA uses statistical methods, and don't require to know the Details of the implementation of cryptographic algorithms. Since then, many different kinds of power analysis were proposed, e.g. Template Attacks, Correlation Power Analysis (CPA), Mutual Information Analysis(MIA) and so on.In this paper, we do some theoretical analysis and derivation of Differential power analysis and Correlation Power Analysis. Then Differential power analysis, Correlation Power Analysis and Mutual Information Analysis were realized by C program. We used them to attack AES algorithm. The attack effect of CPA is clear when using 10000 power curves, but not DPA and MIA. The attack effect of DPA becomes clear when using 20000 power curves, but the attack effect of MIA is still not.
Keywords/Search Tags:DPA, CPA, MIA, AES, Power Model
PDF Full Text Request
Related items