Power-Analysis Attack on an ASIC AES implementation

  • Authors:
  • Siddika Berna Örs;Frank Gürkaynak;Elisabeth Oswald;Bart Preneel

  • Affiliations:
  • -;-;-;-

  • Venue:
  • ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

The AES (Advanced Encryption Standard) is a new blockcipher standard published by the US government in November2001. As a consequence, there is a growing interestin efficient implementations of the AES. For many applications,these implementations need to be resistant againstside channel attacks, that is, it should not be too easy toextract secret information from physical measurements onthe device. This article presents the first results on the feasibilityof power analysis attack against an AES hardwareimplementation. Our attack is targeted against an ASIC implementationof the AES developed by the ETH Zurich. Weshow how to build a reliable measurement setup and how toimprove the correlation coefficients, i.e., the signal to noiseratio for our measurements. Our approach is also the firststep to link a behavior HDL simulator generated simulatedpower measurements to real power measurements.