Side channel power analysis on a target with an AES-256 encryption

Information security often relies on strong cryptographic algorithms like Advanced Encryption Standard (AES). However, cracking AES encryption with side-channel attacks (SCA) has become a growing concern. SCA exploits fluctuations in a device's power consumption during encryption, potentially r...

Full description

Saved in:
Bibliographic Details
Main Author: Liu, Junnan
Other Authors: Gwee Bah Hwee
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2024
Subjects:
Online Access:https://hdl.handle.net/10356/176336
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-176336
record_format dspace
spelling sg-ntu-dr.10356-1763362024-05-17T15:45:22Z Side channel power analysis on a target with an AES-256 encryption Liu, Junnan Gwee Bah Hwee School of Electrical and Electronic Engineering ebhgwee@ntu.edu.sg Engineering Electrical and electronic engineering Information security often relies on strong cryptographic algorithms like Advanced Encryption Standard (AES). However, cracking AES encryption with side-channel attacks (SCA) has become a growing concern. SCA exploits fluctuations in a device's power consumption during encryption, potentially revealing crucial information about the secret key. This has highlighted the significance of further research on understanding how SCA bypasses the protections offered by AES, ultimately compromising the confidentiality of encrypted data. This project involves the implementation of AES-128, AES-192, and AES-256 on a microcontroller, and the recovery of the secret key with SCA, to further investigate the vulnerabilities of a target device utilising such cryptographic algorithms to such attacks. We implemented AES encryption on a device by importing the ‘Crypto’ library in Arduino IDE. Power traces were collected and saved by importing a specialised library supporting the connection with the oscilloscope and ‘NumPy’ in Python script, respectively. SCA and analysis were conducted using the Async2Secure SCA toolkit. We employed Correlation Power Analysis (CPA), a technique that yields correlation coefficients for identifying correlations between power consumption patterns and specific bytes of secret keys. The report details the experimental setup, data acquisition process, and analysis methods used. The results section presents the success rate of the attack in recovering the secret key. We also discuss factors influencing the attack's effectiveness, such as the number of power traces captured and the change in correlation coefficients. Bachelor's degree 2024-05-16T02:44:04Z 2024-05-16T02:44:04Z 2024 Final Year Project (FYP) Liu, J. (2024). Side channel power analysis on a target with an AES-256 encryption. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/176336 https://hdl.handle.net/10356/176336 en A2075-231 application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering
Electrical and electronic engineering
spellingShingle Engineering
Electrical and electronic engineering
Liu, Junnan
Side channel power analysis on a target with an AES-256 encryption
description Information security often relies on strong cryptographic algorithms like Advanced Encryption Standard (AES). However, cracking AES encryption with side-channel attacks (SCA) has become a growing concern. SCA exploits fluctuations in a device's power consumption during encryption, potentially revealing crucial information about the secret key. This has highlighted the significance of further research on understanding how SCA bypasses the protections offered by AES, ultimately compromising the confidentiality of encrypted data. This project involves the implementation of AES-128, AES-192, and AES-256 on a microcontroller, and the recovery of the secret key with SCA, to further investigate the vulnerabilities of a target device utilising such cryptographic algorithms to such attacks. We implemented AES encryption on a device by importing the ‘Crypto’ library in Arduino IDE. Power traces were collected and saved by importing a specialised library supporting the connection with the oscilloscope and ‘NumPy’ in Python script, respectively. SCA and analysis were conducted using the Async2Secure SCA toolkit. We employed Correlation Power Analysis (CPA), a technique that yields correlation coefficients for identifying correlations between power consumption patterns and specific bytes of secret keys. The report details the experimental setup, data acquisition process, and analysis methods used. The results section presents the success rate of the attack in recovering the secret key. We also discuss factors influencing the attack's effectiveness, such as the number of power traces captured and the change in correlation coefficients.
author2 Gwee Bah Hwee
author_facet Gwee Bah Hwee
Liu, Junnan
format Final Year Project
author Liu, Junnan
author_sort Liu, Junnan
title Side channel power analysis on a target with an AES-256 encryption
title_short Side channel power analysis on a target with an AES-256 encryption
title_full Side channel power analysis on a target with an AES-256 encryption
title_fullStr Side channel power analysis on a target with an AES-256 encryption
title_full_unstemmed Side channel power analysis on a target with an AES-256 encryption
title_sort side channel power analysis on a target with an aes-256 encryption
publisher Nanyang Technological University
publishDate 2024
url https://hdl.handle.net/10356/176336
_version_ 1800916283683766272