원문정보
초록
영어
Side channel attacks are attacks that are based on “Side Channel Information”. Side channel information is information that can be retrieved from the encryption device that is neither the plaintext to be encrypted nor the cipher text resulting from the encryption process. Side-channel attacks are easy-to-implement whilst powerful attacks against cryptographic implementations and their targets range from primitives, protocols, modules, and devices to even systems. These attacks pose a serious threat to the security of cryptographic modules. In consequence, cryptographic implementations have to be evaluated for their resistivity against such attacks and the incorporation of different countermeasures has to be considered. In this paper, we explain about the correlation power analysis attack, which is the most dangerous type of side channel attack. Also, we implemented and experiment this attack using ATmega cryptographic module for configuration and the oscilloscope to obtain the experimental result, and MATLAB program for the verification process and design technology to analyze countermeasures.
목차
1. Introduction
2. AES Algorithm Model CPA Attack
2.1. Time of the Attack Function
3. Using ATmega Cryptographic Module Configuration
4. Experimental and Analytical CAP Attack
4.1. Measuring Power Consumption Signal and Key Generation Guess
4.2. Correlation COEFFICIENT CALCULATION
4.3. CPA Attack Experimental Results
5. Software-based Countermeasures
6. Conclusion
Acknowledgements
References
