Power-analysis attack on an ASIC AES implementation

Siddika Berna Örs*, Frank Gürkaynak, Elisabeth Oswald, Bart Preneel

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

210 Citations (Scopus)

Abstract

The AES (Advanced Encryption Standard) is a new block cipher standard published by the US government in November 2001. As a consequence, there is a growing interest in efficient implementations of the AES. For many applications, these implementations need to be resistant against side channel attacks, that is, it should not be too easy to extract secret information from physical measurements on the device. This article presents the first results on the feasibility of power analysis attack against an AES hardware implementation. Our attack is targeted against an ASIC implementation of the AES developed by the ETH Zurich. We show how to build a reliable measurement setup and how to improve the correlation coefficients, i.e., the signal to noise ratio for our measurements. Our approach is also the first step to link a behavior HDL simulator generated simulated power measurements to real power measurements.

Original languageEnglish
Title of host publicationInternational Conference on Information Technology
Subtitle of host publicationCoding Computing, ITCC 2004
PublisherIEEE Computer Society
Pages546-552
Number of pages7
ISBN (Print)0769521088, 9780769521084
DOIs
Publication statusPublished - 2004
Externally publishedYes
EventInternational Conference on Information Technology: Coding Computing, ITCC 2004 - Las Vegas, NV, United States
Duration: 5 Apr 20047 Apr 2004

Publication series

NameInternational Conference on Information Technology: Coding Computing, ITCC
Volume2

Conference

ConferenceInternational Conference on Information Technology: Coding Computing, ITCC 2004
Country/TerritoryUnited States
CityLas Vegas, NV
Period5/04/047/04/04

Keywords

  • AES
  • Power analysis attack

Fingerprint

Dive into the research topics of 'Power-analysis attack on an ASIC AES implementation'. Together they form a unique fingerprint.

Cite this