Attacking AES-masking encryption device with correlation power analysis

6Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

Cryptography is the science and art of hiding and securing information. There is a new vulnerability in a cryptographic algorithm implemented on a hardware device. This vulnerability is considered capable of uncovering secret key used in a cryptographic algorithm. This technique is known as Side channel attack (SCA). Previous and other research introduces countermeasure to countering this new vulnerability. Some researchers suggest using logic level with encoding the AES. The countermeasure using logic is very low cost and efficient. The contribution of this paper is to analyze CPA on encryption device that has been given logic level countermeasure. Our finding of this paper is the use of encoding with one-hot masking technique does not provide the maximum countermeasure effect against CPA-based attacks. In this research CPA attack can be successfully revealing the AES secret-key.

Author supplied keywords

Cite

CITATION STYLE

APA

Putra, S. D., Ahmad, A. S., Sutikno, S., & Kurniawan, Y. (2018). Attacking AES-masking encryption device with correlation power analysis. International Journal of Communication Networks and Information Security, 10(2), 397–402. https://doi.org/10.17762/ijcnis.v10i2.2884

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free