A highly efficient cyber-physical-attack on smart card with AES-128 algorithm implementation

The Advanced Encryption Standard (AES) cipher is the most widely used algorithm used today to secure highly-confidential information. Side-channel attacks (SCA) target implementations of the cipher to reveal the secret keys used for encryption and decryption. Correlation Power Analysis (CPA) is a ty...

Full description

Saved in:
Bibliographic Details
Main Author: Hilos, Carlene Gutierrez
Other Authors: Gwee Bah Hwee
Format: Final Year Project
Language:English
Published: 2018
Subjects:
Online Access:http://hdl.handle.net/10356/75504
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-75504
record_format dspace
spelling sg-ntu-dr.10356-755042023-07-07T17:36:12Z A highly efficient cyber-physical-attack on smart card with AES-128 algorithm implementation Hilos, Carlene Gutierrez Gwee Bah Hwee School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering The Advanced Encryption Standard (AES) cipher is the most widely used algorithm used today to secure highly-confidential information. Side-channel attacks (SCA) target implementations of the cipher to reveal the secret keys used for encryption and decryption. Correlation Power Analysis (CPA) is a type of SCA that was selected due to its advantages over other SCA, namely Simple Power Analysis (SPA) and Differential Power Analysis (DPA). Smartcards are just some devices that utilize AES to secure data due to their usage in industries like the military, banking and government. Hence, this project will focus on revealing the secret keys used on AES-128 secured smartcards. SCA were conducted on AES-128 secured smartcards, and the power consumption leaked measured. This data is then inputted into a program designed to successfully reveal the 16 sub-keys used to secure the smartcard. This program was designed to model the AES algorithm, and correlate the derived power model with the actual power consumption leaked. Ultimately, the sub-keys would be revealed according to the highest correlation values. Having utilised a Look-Up-Table (LUT) based AES S-Box implementation, the program is designed to be faster than conventional S-Box implementations. This is because values are pre-computed as opposed to requiring computation during implementation. Bachelor of Engineering 2018-06-01T01:36:24Z 2018-06-01T01:36:24Z 2018 Final Year Project (FYP) http://hdl.handle.net/10356/75504 en Nanyang Technological University 76 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Electrical and electronic engineering
spellingShingle DRNTU::Engineering::Electrical and electronic engineering
Hilos, Carlene Gutierrez
A highly efficient cyber-physical-attack on smart card with AES-128 algorithm implementation
description The Advanced Encryption Standard (AES) cipher is the most widely used algorithm used today to secure highly-confidential information. Side-channel attacks (SCA) target implementations of the cipher to reveal the secret keys used for encryption and decryption. Correlation Power Analysis (CPA) is a type of SCA that was selected due to its advantages over other SCA, namely Simple Power Analysis (SPA) and Differential Power Analysis (DPA). Smartcards are just some devices that utilize AES to secure data due to their usage in industries like the military, banking and government. Hence, this project will focus on revealing the secret keys used on AES-128 secured smartcards. SCA were conducted on AES-128 secured smartcards, and the power consumption leaked measured. This data is then inputted into a program designed to successfully reveal the 16 sub-keys used to secure the smartcard. This program was designed to model the AES algorithm, and correlate the derived power model with the actual power consumption leaked. Ultimately, the sub-keys would be revealed according to the highest correlation values. Having utilised a Look-Up-Table (LUT) based AES S-Box implementation, the program is designed to be faster than conventional S-Box implementations. This is because values are pre-computed as opposed to requiring computation during implementation.
author2 Gwee Bah Hwee
author_facet Gwee Bah Hwee
Hilos, Carlene Gutierrez
format Final Year Project
author Hilos, Carlene Gutierrez
author_sort Hilos, Carlene Gutierrez
title A highly efficient cyber-physical-attack on smart card with AES-128 algorithm implementation
title_short A highly efficient cyber-physical-attack on smart card with AES-128 algorithm implementation
title_full A highly efficient cyber-physical-attack on smart card with AES-128 algorithm implementation
title_fullStr A highly efficient cyber-physical-attack on smart card with AES-128 algorithm implementation
title_full_unstemmed A highly efficient cyber-physical-attack on smart card with AES-128 algorithm implementation
title_sort highly efficient cyber-physical-attack on smart card with aes-128 algorithm implementation
publishDate 2018
url http://hdl.handle.net/10356/75504
_version_ 1772827917131186176