Breaking the hardware implementation of AES encryption
Advanced Encryption Standard (AES) is an extensively used symmetric block cipher algorithm which generates ciphertext based on plaintext and key (128, 192, or 256 bits) inputs. Recover the cipher key through brute-force attempts is unrealistic due to the extremely high computation complexity. Nevert...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/149897 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-149897 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1498972023-07-07T18:29:05Z Breaking the hardware implementation of AES encryption He, Weiyang Chang Chip Hong School of Electrical and Electronic Engineering ECHChang@ntu.edu.sg Engineering::Electrical and electronic engineering Advanced Encryption Standard (AES) is an extensively used symmetric block cipher algorithm which generates ciphertext based on plaintext and key (128, 192, or 256 bits) inputs. Recover the cipher key through brute-force attempts is unrealistic due to the extremely high computation complexity. Nevertheless, recent studies show that physical attacks, such as fault analysis and side-channel analysis, on hardware platform can reveal the cipher key with limited fault-free and faulty ciphertexts. These lightweight and low-cost physical attacks bring a huge challenge on embedded devices. Thus, investigation and analysis of modern embedded devices under physical attacks become a critical procedure to build a robust and reliable Internet of Things (IoT) network. This project was conducted to examine various types of physical attack techniques, including Differential Power Analysis (DPA), Correlation Power Analysis (CPA) and Differential Fault Analysis (DFA). ChipWhisperer capture board and python interface was utilized to initiate the attack against AES implemented on XMEGA microcontroller and CW305 FPGA board. In the case of targeting AES on XMEGA microcontroller, a DPA attack successfully broke the AES-128 key by collecting 1200 power traces within 2 minutes. On the other hand, a CPA attack only required 50 traces and 11 seconds to reveal the key. Exploiting second-order CPA attack against a fully-masked AES was also conducted. After collecting 500 traces and using 7 minutes 23 seconds, the AES key was successfully broken. Moreover, DFA can reveal the key by injecting one byte of fault twice and performing 2 seconds of analysis on two faulty ciphertexts. If only one fault injection is permitted, DFA still can crack the AES, but with 16 minutes post-processing time. The results of these experiments show that AES algorithm has many security vulnerabilities in terms of physical implementation. It is imperative to design a protection scheme on AES that takes into account all of these possible physical attacks. Bachelor of Engineering (Electrical and Electronic Engineering) 2021-06-10T04:12:59Z 2021-06-10T04:12:59Z 2021 Final Year Project (FYP) He, W. (2021). Breaking the hardware implementation of AES encryption. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/149897 https://hdl.handle.net/10356/149897 en application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Electrical and electronic engineering |
spellingShingle |
Engineering::Electrical and electronic engineering He, Weiyang Breaking the hardware implementation of AES encryption |
description |
Advanced Encryption Standard (AES) is an extensively used symmetric block cipher algorithm which generates ciphertext based on plaintext and key (128, 192, or 256 bits) inputs. Recover the cipher key through brute-force attempts is unrealistic due to the extremely high computation complexity. Nevertheless, recent studies show that physical attacks, such as fault analysis and side-channel analysis, on hardware platform can reveal the cipher key with limited fault-free and faulty ciphertexts. These lightweight and low-cost physical attacks bring a huge challenge on embedded devices. Thus, investigation and analysis of modern embedded devices under physical attacks become a critical procedure to build a robust and reliable Internet of Things (IoT) network.
This project was conducted to examine various types of physical attack techniques, including Differential Power Analysis (DPA), Correlation Power Analysis (CPA) and Differential Fault Analysis (DFA). ChipWhisperer capture board and python interface was utilized to initiate the attack against AES implemented on XMEGA microcontroller and CW305 FPGA board. In the case of targeting AES on XMEGA microcontroller, a DPA attack successfully broke the AES-128 key by collecting 1200 power traces within 2 minutes. On the other hand, a CPA attack only required 50 traces and 11 seconds to reveal the key. Exploiting second-order CPA attack against a fully-masked AES was also conducted. After collecting 500 traces and using 7 minutes 23 seconds, the AES key was successfully broken. Moreover, DFA can reveal the key by injecting one byte of fault twice and performing 2 seconds of analysis on two faulty ciphertexts. If only one fault injection is permitted, DFA still can crack the AES, but with 16 minutes post-processing time.
The results of these experiments show that AES algorithm has many security vulnerabilities in terms of physical implementation. It is imperative to design a protection scheme on AES that takes into account all of these possible physical attacks. |
author2 |
Chang Chip Hong |
author_facet |
Chang Chip Hong He, Weiyang |
format |
Final Year Project |
author |
He, Weiyang |
author_sort |
He, Weiyang |
title |
Breaking the hardware implementation of AES encryption |
title_short |
Breaking the hardware implementation of AES encryption |
title_full |
Breaking the hardware implementation of AES encryption |
title_fullStr |
Breaking the hardware implementation of AES encryption |
title_full_unstemmed |
Breaking the hardware implementation of AES encryption |
title_sort |
breaking the hardware implementation of aes encryption |
publisher |
Nanyang Technological University |
publishDate |
2021 |
url |
https://hdl.handle.net/10356/149897 |
_version_ |
1772825567838601216 |