会议专题

Improved Differential Power Analysis Attacks on AES Hardware Implementations

This paper presents an alternative way to enhance power analysis attacks on AES hardware implementations for wireless sensor network (WSN) nodes. The proposed attack method adopts hamming differences of intermediate results as the power model and arranges plaintext inputs to maximize the differences of power traces. A simulation-based experimental environment is built, and various power attacks are conducted on our AES hardware implementation. Unlike on software implementations, conventional power attacks on hardware implementations may not succeed or require more computations. However, our proposed method improves the success rate effectively using acceptable number of power traces and fewer computations. Furthermore, experimental results also demonstrate that the linear operations of AES hardware implementations extremely leak the data-dependent power information vulnerable to power attacks.

security AES Differentia Power Analysis(DPA) Power Model

Yu Han Xuecheng Zou Zhenglin Liu Yicheng Chen

Research Center for VLSI and Systems, Department of Electronic Science & Technology Huazhong University of Science & Technology Wuhan 430074, China

国际会议

第三届IEEE无线通讯、网络技术暨移动计算国际会议

上海

英文

2007-09-21(万方平台首次上网日期,不代表论文的发表时间)