Font Size: a A A

Software Implementation Of AES Against Side Channel Attack In Smartcard

Posted on:2015-02-06Degree:MasterType:Thesis
Country:ChinaCandidate:Z G WangFull Text:PDF
GTID:2298330422972130Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The security of smart cards includes not only the security of cryptographicalgorithms they use math on, but also the physical security of these algorithms on apost.Any cryptographic device will leak some side channel information such as power,electromagnetic radios, working time, sound and so on.Side channel attack is such kindof attack that collects the side channel information and analyzes it to recover the secretinformation of the cryptographic devices. There are two main types of smart card. Thefirst is hardware implemented system, in which hardware is designed to complete everysteps of the cryptographic algorithm. The other is software implemented system. In thiskind of systems, algorithms are programmed and then executed on CPU. Most researchon the resistant countermeasure to SCA focuses on the hardware implemented systems.The software implemented resistant methods is not noted enough and lack of targetedresearch.And from the perspective of trends in the use of smart cards, the future will bemore use of the software implemented in the form of a smart card, as8-bit smart cards.And the Advanced Encryption Standard (AES) is the most popular primitive forencryption today.Therefore, this paper compares different protection,proposesprotection scheme based masking, improves the ordinary AES algorithm resistant sidechannel attacks.The main work is as follows:1) A simple analysis of the feasibility and efficiency of the protection scheme inthe software implementation,compare the differences between the hardwareand software to achieve mask protective mask,And a detailed analysis of thesecurity and efficiency of mask technology on8-bit smart cards. Eventuallyproposed specific mask protection scheme, illustrate the specific mask ofS-boxes and other linear change. Finally achieved by encoding the program inthe8-bit smart cards。2) Build a simulation platform for testing algorithms security. Choose thenecessary hardware for simulation test platform, and put them together. Finally,according to the simulation test platform, Using the idea of softwareengineering design and implement the power consumption collection programfor the SASEBO-W and analysis program for Correlation Power Attack.3) Verify the feasibility and effectiveness of the mask scheme in simulationplatform, and make a comprehensive comparative with the ordinary AES algorithm, then analyzes the experimental results.Experimental results show that the proposed scheme based mask protection canresistant CPA effectively compared with the ordinary AES algorithm.
Keywords/Search Tags:Smart Card, CPA, Mask Technology, AES, Mask
PDF Full Text Request
Related items