Power-analysis attack on an ASIC AES implementation

  • Ors S
  • Gurkaynak F
  • Oswald E
  • et al.
N/ACitations
Citations of this article
54Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The AES (advanced encryption standard) is a new block cipher standard published by the US government in November 2001. As a consequence, there is a growing interest in efficient implementations of the AES. For many applications, these implementations need to be resistant against side channel attacks, that is, it should not be too easy to extract secret information from physical measurements on the device. We present the first results on the feasibility of power analysis attack against an AES hardware implementation. Our attack is targeted against an ASIC implementation of the AES developed by the ETH Zurich. We show how to build a reliable measurement setup and how to improve the correlation coefficients, i.e., the signal to noise ratio for our measurements. Our approach is also the first step to link a behavior HDL simulator generated simulated power measurements to real power measurements.

Cite

CITATION STYLE

APA

Ors, S. B., Gurkaynak, F., Oswald, E., & Preneel, B. (2004). Power-analysis attack on an ASIC AES implementation (pp. 546-552 Vol.2). Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/itcc.2004.1286711

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free