DocumentCode :
1813467
Title :
AES Key Recovery Based on Switching Distance Model
Author :
Liu, Hongying ; Qian, Guoyu ; Goto, Satoshi ; Tsunoo, Yukiyasu
Author_Institution :
Grad. Sch. of Inf., Production & Syst., Waseda Univ., Fukuoka, Japan
fYear :
2010
fDate :
29-31 July 2010
Firstpage :
218
Lastpage :
222
Abstract :
As one of the effective side-channel attacks that threaten the security of cryptographic devices, Correlation Power Analysis (CPA) attacks exploit the linear relation between the known power consumption and the predicted power consumption of cryptographic devices to recover keys. A robust cryptographic algorithm should endure both the cryptanalysis from software and hardware implementations. Researches have focused on the security examination of AES (Advanced Encryption Standard). In this paper, we present the CPA attack with the Switching Distance model against an AES implementation on ASIC. Compared with the leakage model of Hamming Distance, the power traces of recovering keys have been decreased by as much as 25%. These should cause more attention of security experts.
Keywords :
cryptography; power aware computing; AES key recovery; CPA attack; advanced encryption standard; correlation power analysis attack; cryptographic devices security; hamming distance; leakage model; power consumption; side-channel attacks; switching distance model; Application specific integrated circuits; Correlation; Encryption; Hamming distance; Power demand; Switches; AES; CPA; Hamming Distance; Side-channel attacks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electronic Commerce and Security (ISECS), 2010 Third International Symposium on
Conference_Location :
Guangzhou
Print_ISBN :
978-1-4244-8231-3
Electronic_ISBN :
978-1-4244-8231-3
Type :
conf
DOI :
10.1109/ISECS.2010.55
Filename :
5557399
Link To Document :
بازگشت