Improved Differential Power Analysis Attacks on AES Hardware Implementations
This paper presents an alternative way to enhance power analysis attacks on AES hardware implementations for wireless sensor network (WSN) nodes. The proposed attack method adopts hamming differences of intermediate results as the power model and arranges plaintext inputs to maximize the differences of power traces. A simulation-based experimental environment is built, and various power attacks are conducted on our AES hardware implementation. Unlike on software implementations, conventional power attacks on hardware implementations may not succeed or require more computations. However, our proposed method improves the success rate effectively using acceptable number of power traces and fewer computations. Furthermore, experimental results also demonstrate that the linear operations of AES hardware implementations extremely leak the data-dependent power information vulnerable to power attacks.
security AES Differentia Power Analysis(DPA) Power Model
Yu Han Xuecheng Zou Zhenglin Liu Yicheng Chen
Research Center for VLSI and Systems, Department of Electronic Science & Technology Huazhong University of Science & Technology Wuhan 430074, China
国际会议
上海
英文
2007-09-21(万方平台首次上网日期,不代表论文的发表时间)