Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Power Analysis of the Advanced Encryption Standard: Attacks and Countermeasures for 8-bit Microcontrollers
Linköping University, Department of Electrical Engineering, Information Coding.
2015 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

The Advanced Encryption Standard is one of the most common encryption algorithms. It is highly resistant to mathematical and statistical attacks, however, this security is based on the assumption that an adversary cannot access the algorithm’s internal state during encryption or decryption. Power analysis is a type of side-channel analysis that exploit information leakage through the power consumption of physical realisations of cryptographic systems. Power analysis attacks capture intermediate results during AES execution, which combined with knowledge of the plaintext or the ciphertext can reveal key material. This thesis studies and compares simple power analysis, differential power analysis and template attacks using a cheap consumer oscilloscope against AES-128 implemented on an 8-bit microcontroller. Additionally, the shuffling and masking countermeasures are evaluated in terms of security and performance. The thesis also presents a practical approach to template building and device characterisation. The results show that attacking a naive implementation with differential power analysis requires little effort, both in preparation and computation time. Template attacks require the least amount of measurements but requires significant preparation. Simple power analysis by itself cannot break the key but proves helpful in simplifying the other attacks. It is found that shuffling significantly increases the number of traces required to break the key while masking forces the attacker to use higher-order techniques.

Place, publisher, year, edition, pages
2015. , 92 p.
Keyword [en]
power analysis, template attacks, countermeasures, microcontroller, AES
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:liu:diva-122718ISRN: LiTH-ISY-EX--15/4907--SEOAI: oai:DiVA.org:liu-122718DiVA: diva2:874463
External cooperation
Sectra Communications AB
Subject / course
Information Coding
Presentation
2015-11-06, Systemet, 14:15 (English)
Supervisors
Examiners
Available from: 2015-11-27 Created: 2015-11-18 Last updated: 2015-11-27Bibliographically approved

Open Access in DiVA

fulltext(9809 kB)289 downloads
File information
File name FULLTEXT01.pdfFile size 9809 kBChecksum SHA-512
31c6b142a0ea6d5a89471960ef32f6141d9b2b3315ebadb23a0220e381b7df7573f590f2d8f59477adc54debd54b9721882a9b07dd3a2f6fd6afaafb778ae07e
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Fransson, Mattias
By organisation
Information Coding
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 289 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 574 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf