Analysis of improved side-channel attack on AES-128 with masking

Encryption is essential for data security in the information age today. The Advanced Encryption Standard (AES) is regarded to be the global ‘gold’ standard for secure encryption. Today, many embedded processors like smart cards are used to store to secret keys, and these are vulnerable to cyber-p...

Full description

Saved in:
Bibliographic Details
Main Author: Tee, Yee Yang
Other Authors: Gwee Bah Hwee
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2020
Subjects:
Online Access:https://hdl.handle.net/10356/141888
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-141888
record_format dspace
spelling sg-ntu-dr.10356-1418882023-07-07T17:53:41Z Analysis of improved side-channel attack on AES-128 with masking Tee, Yee Yang Gwee Bah Hwee School of Electrical and Electronic Engineering ebhgwee@ntu.edu.sg Engineering::Electrical and electronic engineering::Integrated circuits Encryption is essential for data security in the information age today. The Advanced Encryption Standard (AES) is regarded to be the global ‘gold’ standard for secure encryption. Today, many embedded processors like smart cards are used to store to secret keys, and these are vulnerable to cyber-physical attacks like Side Channel Attack (SCA). Adversaries can exploit the power dissipation, electromagnetic emanation or timing information during the encryption process and obtain the secret key. Due to the possibilities of SCA, many processors today have protective measures like masking and hiding implemented.Masking is used to decorrelate power consumption and reduce information leakage. An improvement to counter masking techniques is a second order attack, which performs the attack on 2 separate points in the power trace. This research focuses on the effectiveness of second order Correlation Power Analysis (CPA), on a masked implementation of AES-128. CPA was first conducted on an unmasked AES-128 design to confirm its effectiveness. This was successful with 1500 power traces. It was also tested against a masked implementation, which proved that masking is highly effective against standard CPA attacks, as no key bytes were obtained with more than 10,000 power traces. Subsequently, second order attacks were conducted against the same masked implementation, which also proved to be secure against such attacks. The masked AES was resilient against second order attacks using more than 10,000 traces, almost 800% of the amount required for an unmasked design. Signal-to-Noise Ratio was used to determine the leakage from changing mask values, and it was concluded that power consumption caused by mask generation was too insignificant to be exploitable. Bachelor of Engineering (Electrical and Electronic Engineering) 2020-06-11T07:48:12Z 2020-06-11T07:48:12Z 2020 Final Year Project (FYP) https://hdl.handle.net/10356/141888 en A2070-191 application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Electrical and electronic engineering::Integrated circuits
spellingShingle Engineering::Electrical and electronic engineering::Integrated circuits
Tee, Yee Yang
Analysis of improved side-channel attack on AES-128 with masking
description Encryption is essential for data security in the information age today. The Advanced Encryption Standard (AES) is regarded to be the global ‘gold’ standard for secure encryption. Today, many embedded processors like smart cards are used to store to secret keys, and these are vulnerable to cyber-physical attacks like Side Channel Attack (SCA). Adversaries can exploit the power dissipation, electromagnetic emanation or timing information during the encryption process and obtain the secret key. Due to the possibilities of SCA, many processors today have protective measures like masking and hiding implemented.Masking is used to decorrelate power consumption and reduce information leakage. An improvement to counter masking techniques is a second order attack, which performs the attack on 2 separate points in the power trace. This research focuses on the effectiveness of second order Correlation Power Analysis (CPA), on a masked implementation of AES-128. CPA was first conducted on an unmasked AES-128 design to confirm its effectiveness. This was successful with 1500 power traces. It was also tested against a masked implementation, which proved that masking is highly effective against standard CPA attacks, as no key bytes were obtained with more than 10,000 power traces. Subsequently, second order attacks were conducted against the same masked implementation, which also proved to be secure against such attacks. The masked AES was resilient against second order attacks using more than 10,000 traces, almost 800% of the amount required for an unmasked design. Signal-to-Noise Ratio was used to determine the leakage from changing mask values, and it was concluded that power consumption caused by mask generation was too insignificant to be exploitable.
author2 Gwee Bah Hwee
author_facet Gwee Bah Hwee
Tee, Yee Yang
format Final Year Project
author Tee, Yee Yang
author_sort Tee, Yee Yang
title Analysis of improved side-channel attack on AES-128 with masking
title_short Analysis of improved side-channel attack on AES-128 with masking
title_full Analysis of improved side-channel attack on AES-128 with masking
title_fullStr Analysis of improved side-channel attack on AES-128 with masking
title_full_unstemmed Analysis of improved side-channel attack on AES-128 with masking
title_sort analysis of improved side-channel attack on aes-128 with masking
publisher Nanyang Technological University
publishDate 2020
url https://hdl.handle.net/10356/141888
_version_ 1772829160872345600