Side channel power analysis on a target with an AES-256 encryption
Information security often relies on strong cryptographic algorithms like Advanced Encryption Standard (AES). However, cracking AES encryption with side-channel attacks (SCA) has become a growing concern. SCA exploits fluctuations in a device's power consumption during encryption, potentially r...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2024
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/176336 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-176336 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1763362024-05-17T15:45:22Z Side channel power analysis on a target with an AES-256 encryption Liu, Junnan Gwee Bah Hwee School of Electrical and Electronic Engineering ebhgwee@ntu.edu.sg Engineering Electrical and electronic engineering Information security often relies on strong cryptographic algorithms like Advanced Encryption Standard (AES). However, cracking AES encryption with side-channel attacks (SCA) has become a growing concern. SCA exploits fluctuations in a device's power consumption during encryption, potentially revealing crucial information about the secret key. This has highlighted the significance of further research on understanding how SCA bypasses the protections offered by AES, ultimately compromising the confidentiality of encrypted data. This project involves the implementation of AES-128, AES-192, and AES-256 on a microcontroller, and the recovery of the secret key with SCA, to further investigate the vulnerabilities of a target device utilising such cryptographic algorithms to such attacks. We implemented AES encryption on a device by importing the ‘Crypto’ library in Arduino IDE. Power traces were collected and saved by importing a specialised library supporting the connection with the oscilloscope and ‘NumPy’ in Python script, respectively. SCA and analysis were conducted using the Async2Secure SCA toolkit. We employed Correlation Power Analysis (CPA), a technique that yields correlation coefficients for identifying correlations between power consumption patterns and specific bytes of secret keys. The report details the experimental setup, data acquisition process, and analysis methods used. The results section presents the success rate of the attack in recovering the secret key. We also discuss factors influencing the attack's effectiveness, such as the number of power traces captured and the change in correlation coefficients. Bachelor's degree 2024-05-16T02:44:04Z 2024-05-16T02:44:04Z 2024 Final Year Project (FYP) Liu, J. (2024). Side channel power analysis on a target with an AES-256 encryption. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/176336 https://hdl.handle.net/10356/176336 en A2075-231 application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering Electrical and electronic engineering |
spellingShingle |
Engineering Electrical and electronic engineering Liu, Junnan Side channel power analysis on a target with an AES-256 encryption |
description |
Information security often relies on strong cryptographic algorithms like Advanced Encryption Standard (AES). However, cracking AES encryption with side-channel attacks (SCA) has become a growing concern. SCA exploits fluctuations in a device's power consumption during encryption, potentially revealing crucial information about the secret key. This has highlighted the significance of further research on understanding how SCA bypasses the protections offered by AES, ultimately compromising the confidentiality of encrypted data. This project involves the implementation of AES-128, AES-192, and AES-256 on a microcontroller, and the recovery of the secret key with SCA, to further investigate the vulnerabilities of a target device utilising such cryptographic algorithms to such attacks.
We implemented AES encryption on a device by importing the ‘Crypto’ library in Arduino IDE. Power traces were collected and saved by importing a specialised library supporting the connection with the oscilloscope and ‘NumPy’ in Python script, respectively. SCA and analysis were conducted using the Async2Secure SCA toolkit. We employed Correlation Power Analysis (CPA), a technique that yields correlation coefficients for identifying correlations between power consumption patterns and specific bytes of secret keys.
The report details the experimental setup, data acquisition process, and analysis methods used. The results section presents the success rate of the attack in recovering the secret key. We also discuss factors influencing the attack's effectiveness, such as the number of power traces captured and the change in correlation coefficients. |
author2 |
Gwee Bah Hwee |
author_facet |
Gwee Bah Hwee Liu, Junnan |
format |
Final Year Project |
author |
Liu, Junnan |
author_sort |
Liu, Junnan |
title |
Side channel power analysis on a target with an AES-256 encryption |
title_short |
Side channel power analysis on a target with an AES-256 encryption |
title_full |
Side channel power analysis on a target with an AES-256 encryption |
title_fullStr |
Side channel power analysis on a target with an AES-256 encryption |
title_full_unstemmed |
Side channel power analysis on a target with an AES-256 encryption |
title_sort |
side channel power analysis on a target with an aes-256 encryption |
publisher |
Nanyang Technological University |
publishDate |
2024 |
url |
https://hdl.handle.net/10356/176336 |
_version_ |
1800916283683766272 |