A simple power-analysis (SPA) attack on implementations of the AES key expansion

  • Authors:
  • Stefan Mangard

  • Affiliations:
  • Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria

  • Venue:
  • ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

This article presents a simple power-analysis (SPA) attack on implementations of the AES key expansion. The attack reveals the secret key of AES software implementations on smart cards by exploiting the fact that the power consumption of most smart-card processors leaks information during the AES key expansion. The presented attack efficiently utilizes this information leakage to substantially reduce the key space that needs to be considered in a brute-force search for the secret key. The details of the attack are described on the basis of smart cards that leak the Hamming weight of intermediate results occurring during the AES key expansion.