Multi-point joint power analysis attack against AES

For the power analysis attack of the AES cryptographic algorithm with the single information leakage point,the traditional attack method does not use as much information as possible in the algorithm and power trace.So there are some problems such as required more power traces,the low utilization rat...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhi-bo DU, UNYuan-hua S, ANGYi W
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2016-10-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016251/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539486849171456
author Zhi-bo DU
UNYuan-hua S
ANGYi W
author_facet Zhi-bo DU
UNYuan-hua S
ANGYi W
author_sort Zhi-bo DU
collection DOAJ
description For the power analysis attack of the AES cryptographic algorithm with the single information leakage point,the traditional attack method does not use as much information as possible in the algorithm and power trace.So there are some problems such as required more power traces,the low utilization rate of information and so on.A novel method of muti-point joint power analysis attack against AES was proposed to solve the problems.And taking the correlation power analysis attack as an example,the detailed attack process was presented.The operations of the round key addition and the SubBytes were chosen as the attack intermediate variable at the same time.Then the joint power leakage function was con-structed for the attack intermediate variable.And the multi-point joint correlation energy analysis attack was given.Aiming at the AES cryptographic algorithm implemented on the smart card,the multi-point joint power analysis attack,the correlation power analysis attack with the single information leakage point in the key addition and the SubBytes were conducted.The measured results validate the proposed method is effective.It also shows that the proposed method has the advantages of high success rate and less power traces comparing with the single information leakage point.
format Article
id doaj-art-297026c8dde54970850d643643a1ace5
institution Kabale University
issn 1000-436X
language zho
publishDate 2016-10-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-297026c8dde54970850d643643a1ace52025-01-14T07:11:10ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2016-10-0137788459705910Multi-point joint power analysis attack against AESZhi-bo DUUNYuan-hua SANGYi WFor the power analysis attack of the AES cryptographic algorithm with the single information leakage point,the traditional attack method does not use as much information as possible in the algorithm and power trace.So there are some problems such as required more power traces,the low utilization rate of information and so on.A novel method of muti-point joint power analysis attack against AES was proposed to solve the problems.And taking the correlation power analysis attack as an example,the detailed attack process was presented.The operations of the round key addition and the SubBytes were chosen as the attack intermediate variable at the same time.Then the joint power leakage function was con-structed for the attack intermediate variable.And the multi-point joint correlation energy analysis attack was given.Aiming at the AES cryptographic algorithm implemented on the smart card,the multi-point joint power analysis attack,the correlation power analysis attack with the single information leakage point in the key addition and the SubBytes were conducted.The measured results validate the proposed method is effective.It also shows that the proposed method has the advantages of high success rate and less power traces comparing with the single information leakage point.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016251/multi-point joint power analysis attackcorrelation power analysis attackAES cryptographic algorithmround key additionSubBytes
spellingShingle Zhi-bo DU
UNYuan-hua S
ANGYi W
Multi-point joint power analysis attack against AES
Tongxin xuebao
multi-point joint power analysis attack
correlation power analysis attack
AES cryptographic algorithm
round key addition
SubBytes
title Multi-point joint power analysis attack against AES
title_full Multi-point joint power analysis attack against AES
title_fullStr Multi-point joint power analysis attack against AES
title_full_unstemmed Multi-point joint power analysis attack against AES
title_short Multi-point joint power analysis attack against AES
title_sort multi point joint power analysis attack against aes
topic multi-point joint power analysis attack
correlation power analysis attack
AES cryptographic algorithm
round key addition
SubBytes
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016251/
work_keys_str_mv AT zhibodu multipointjointpoweranalysisattackagainstaes
AT unyuanhuas multipointjointpoweranalysisattackagainstaes
AT angyiw multipointjointpoweranalysisattackagainstaes