首页> 外文会议>International Conference on Radioelektronika >Differential power analysis attack on ARM based AES implementation without explicit synchronization
【24h】

Differential power analysis attack on ARM based AES implementation without explicit synchronization

机译:无需显式同步的基于ARM的AES实现的差分功率分析攻击

获取原文

摘要

This paper presents Differential Power Analysis (DPA) attack on 32-bit ARM Cortex-M3 microprocessor. Attacked algorithm is unprotected Advanced Encryption Standard (AES) with 128-bit key. DPA attack is deployed on the ARM processor by measuring its instantaneous power consumption during encryption algorithm. Analyzed power consumption traces obtained from the measurement are out-of-sync as they would be during the realistic DPA attack without using trigger to synchronize the traces. Unaligned traces or regular methods of static alignment are inappropriate for further analysis. In this paper elastic alignment methods are used for the trace synchronization. Dynamic Time Warping (DTW) and its fast algorithm FastDTW are deployed in order to match similar patterns in reference and misaligned power consumption traces. Output of DTW - optimal path is then used for the alignment process. Aligned traces are used for further processing and evaluation of the DPA attack. The result is successful DPA attack on misaligned power consumption traces and recovery of the secret 128-bit key. Results are comparable with DPA attack using trigger to align power traces during measurement.
机译:本文介绍了对32位ARM Cortex-M3微处理器的差分功耗分析(DPA)攻击。被攻击的算法是带有128位密钥的不受保护的高级加密标准(AES)。通过测量加密算法期间的瞬时功耗,将DPA攻击部署在ARM处理器上。从测量中获得的已分析功耗轨迹与实际DPA攻击期间不同步,而没有使用触发器来同步轨迹。未对齐的迹线或常规的静态对齐方法不适合进一步分析。在本文中,弹性对准方法用于跟踪同步。部署了动态时间规整(DTW)及其快速算法FastDTW,以匹配参考和未对齐功耗轨迹中的相似模式。 DTW的输出-最佳路径随后用于对齐过程。对齐的迹线用于进一步处理和评估DPA攻击。结果是成功地对未对齐的功耗轨迹进行了DPA攻击,并恢复了秘密的128位密钥。结果与DPA攻击相当,后者使用触发器在测量过程中对齐电源走线。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号