Abstract
As one of the effective side-channel attacks that threaten the security of cryptographic devices, Correlation Power Analysis (CPA) attacks exploit the linear relation between the known power consumption and the predicted power consumption of cryptographic devices to recover keys. A robust cryptographic algorithm should endure both the cryptanalysis from software and hardware implementations. Researches have focused on the security examination of AES (Advanced Encryption Standard). In this paper, we present the CPA attack with the Switching Distance model against an AES implementation on ASIC. Compared with the leakage model of Hamming Distance, the power traces of recovering keys have been decreased by as much as 25%. These should cause more attention of security experts.
Original language | English |
---|---|
Title of host publication | 3rd International Symposium on Electronic Commerce and Security, ISECS 2010 |
Pages | 218-222 |
Number of pages | 5 |
DOIs | |
Publication status | Published - 2010 |
Event | 3rd International Symposium on Electronic Commerce and Security, ISECS 2010 - Guangzhou Duration: 2010 Jul 29 → 2010 Jul 31 |
Other
Other | 3rd International Symposium on Electronic Commerce and Security, ISECS 2010 |
---|---|
City | Guangzhou |
Period | 10/7/29 → 10/7/31 |
Keywords
- AES
- CPA
- Hamming Distance
- Side-channel attacks
ASJC Scopus subject areas
- Management of Technology and Innovation
- Marketing