2016
DOI: 10.1080/23742917.2016.1231523
|View full text |Cite
|
Sign up to set email alerts
|

Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)

Abstract: This article demonstrates two fundamental techniques of power analysis, differential power analysis (DPA) and correlation power analysis (CPA), against a modern piece of hardware which is widely available to the public: the Arduino Uno microcontroller. The DPA attack we implement is referred to as the Difference of Means attack while the CPA attack is implemented by building a power model of the device using the Hamming Weight Power Model method. The cryptographic algorithm we have chosen to attack is AES-128.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
20
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 70 publications
(24 citation statements)
references
References 11 publications
0
20
0
Order By: Relevance
“…Our technique differs since we use CPA in place of DPA. Additionally, as power analysis against the AES algorithm has shown [9], although DPA is certainly a valid technique it appears quite susceptible to noise and interference thus increasing the probability of false-positives and incorrect results.…”
Section: Related Workmentioning
confidence: 99%
“…Our technique differs since we use CPA in place of DPA. Additionally, as power analysis against the AES algorithm has shown [9], although DPA is certainly a valid technique it appears quite susceptible to noise and interference thus increasing the probability of false-positives and incorrect results.…”
Section: Related Workmentioning
confidence: 99%
“…This scheme could recover the 128‐bit key of KASUMI. CPA on AES has been presented in Reference . In this attack, the Hamming Weight power model is used to construct the power model of the device to mount the attack on AES‐128.…”
Section: Related Workmentioning
confidence: 99%
“…This form of attack needs to access internal register values for the computations. CPA on advance encryption standard (AES) has been proposed in literature. To the best of our knowledge, CPA attack on LED has not been discussed in the literature.…”
Section: Introductionmentioning
confidence: 99%
“…Along with this, it has been identified as having weaknesses our side channel attacks. In [2], the researchers attack a 128-bit AES key on an Arduino device using differential power analysis and correlation power analysis (CPA) and crack it within 30 min.…”
Section: Introductionmentioning
confidence: 99%
“…Along with this, the method must also have a low requirement for RAM (where the method requires the usage of running memory to perform its operation) and ROM (where the method is stored on the device). In order to assess the strengths of various methods, we often define the area that the cryptography function will use on the deviceand which is defined in µm 2 .…”
Section: Introductionmentioning
confidence: 99%