Font Size: a A A

Energy Analysis Of The Aes Algorithm And Its Software Simulation

Posted on:2007-01-13Degree:MasterType:Thesis
Country:ChinaCandidate:Z WangFull Text:PDF
GTID:2208360185955805Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Hardware cryptosystems run faster and safer than software cryptosystems. They are widely applied in communication, finance and information security field. Hardware cryptosystems are power-consuming. This power consumption, which is indicated by the fluctuation of electric current or voltage, contains the information of data processed currently. And the data are related to the secret key. Therefore the attacker can break though hardware cryptosystems through measuring and analyzing their power consumption. This is a new powerful cryptanalytic method called power analysis attack.Rijndael block cipher was designed by Joan Daemen and Vincent Rijmen of Belgium. In October 2000, the National Standards and Technology (NIST) chose the Rijndael algorithm to be adopted as Advanced Encryption Standard (AES) by the U.S. Department of Commence, replacing to Data Encryption Standard algorithm (DES). It is playing an important role in data protection area.Some papers about power analysis against AES algorithm have been published by foreign researchers by far, whereas domestic achievements are few in public. For reasons mentioned above, AES algorithm was chose to be the target algorithm attacked by power analysis in our project.In this paper, two types of modified algorithm based on fixed-value masking method (FVM), named Evolving Fixed-Value Masking method II (EFVM II) type I and type II respectively, are proposed to resist second-order differential power analysis attack. This attack can break AES algorithm with FVM. Their security and implementation capability is analyzed in this paper.Finally, power-analysis emulator software, which helps to shorten the development iteration cycle of security IC, is developed in C++ language. Some function modules are demonstrated in pseudo-code. Simple power analysis attack, first-order xoring differential power analysis attack and first-order S box differential power analysis attack is simulated with the emulator and expectant goals achieved.
Keywords/Search Tags:AES algorithm, power analysis, fixed-value masking method, simulation and analysis
PDF Full Text Request
Related items