Font Size: a A A

Research On Power Analysis Attack And Protection Of Encryption Algorithm

Posted on:2021-12-17Degree:MasterType:Thesis
Country:ChinaCandidate:Q W ZhangFull Text:PDF
GTID:2518306476460304Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet of Things technology,the application of information encryption technology has become more and more widespread.Information encryption is mainly realized by software or hardware.However,the cryptographic chip based on hardware has the advantages of fast speed and low power consumption,so it has become a research hotspot.This thesis studies the power analysis attack method and countermeasures of AES algorithm.In order to improve the efficiency of side channel attacks and reduce the cost of attacks,this thesis analyzes the principle of AES encryption on the basis of power consumption theory,proposes a strategy for power analysis attacks on AES,and designs a power analysis attack platform.The platform is based on the EDA tool of Synopsys software.Through simulation experiments,the power consumption information of AES during execution is collected.Two mathematical statistical methods are applied to attack using two intermediate value positions and two power consumption models,making full use of data and power correlation.The DPA attack results show that the differential power curve corresponding to the real key has a distinct peak value that is different from other curves.The CPA attack result shows that the correlation coefficient corresponding to the real key is the largest and has a distinct peak value at the point of attack Simulation results show that the key of AES can be cracked successively,illustrating the effectiveness of our analytical method.In terms of anti-power analysis attacks,this thesis presents a masked AES countermeasure.By covering the intermediate value of the encryption process,the power traces of the device has no dependence with the original intermediate value.So the attacker cannot obtain the real key information through the power traces.This method greatly increases the robustness of the AES encryption circuit against side channel analysis attacks.Applying this solution can effectively resist power analysis attacks and improve the security of AES.
Keywords/Search Tags:advanced encryption standard(AES), side channel analysis attacks, mask
PDF Full Text Request
Related items