Journal on Communications ›› 2016, Vol. 37 ›› Issue (Z1): 78-84.doi: 10.11959/j.issn.1000-436x.2016251

• Contents Papers • Previous Articles     Next Articles

Multi-point joint power analysis attack against AES

Zhi-bo DU1,UNYuan-hua S2,ANGYi W1   

  1. 1 College of Information Security Engineering,Chengdu University of Information Technology,Chengdu 610225,China
    2 School of Computer Science,Neijiang Normal University,Neijiang 641100,China
  • Online:2016-10-25 Published:2017-01-17
  • Supported by:
    The National Science and Technology Major Project of Hegaoji;The National High Technology Research and Development Program (863 Program);The Key Technology Research and Devel-opment Program of Sichuan Province;The Major Scientific Research Foundation of Sichuan Educational Com-mission;The Scientific Research Talent Fund of CUIT

Abstract:

For the power analysis attack of the AES cryptographic algorithm with the single information leakage point,the traditional attack method does not use as much information as possible in the algorithm and power trace.So there are some problems such as required more power traces,the low utilization rate of information and so on.A novel method of muti-point joint power analysis attack against AES was proposed to solve the problems.And taking the correlation power analysis attack as an example,the detailed attack process was presented.The operations of the round key addition and the SubBytes were chosen as the attack intermediate variable at the same time.Then the joint power leakage function was con-structed for the attack intermediate variable.And the multi-point joint correlation energy analysis attack was given.Aiming at the AES cryptographic algorithm implemented on the smart card,the multi-point joint power analysis attack,the correlation power analysis attack with the single information leakage point in the key addition and the SubBytes were conducted.The measured results validate the proposed method is effective.It also shows that the proposed method has the advantages of high success rate and less power traces comparing with the single information leakage point.

Key words: multi-point joint power analysis attack, correlation power analysis attack, AES cryptographic algorithm, round key addition, SubBytes

No Suggested Reading articles found!