Revealing AES Encryption Device Key on 328P Microcontrollers with Differential Power Analysis

This research demonstrates the revealing of an advanced encryption standard (AES) encryption device key. The encryption device is applied to an ATMEGA328P microcontroller. The said microcontroller is a device commonly used in internet of things (IoT). We measured power consumption when the encryption process is taking place. The message sent to the encryption device is randomly generated, but the key used has a fixed value. The novelty of this research is the creation of a systematic and optimal circuit in carrying the differential power analysis or difference of means (DPA/DoM) technique, so the technique can be applied in key revealing on a microcontroller device by using 500 traces in 120 seconds.

[1]  Louis Goubin,et al.  DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.

[2]  Aciek Ida Wuryandari,et al.  Brain-Inspired Knowledge-Growing System: Towards a True Cognitive Agent , 2012 .

[3]  Nidhi Goel,et al.  FPGA implementation of an 8-bit AES architecture: A rolled and masked S-Box approach , 2015, 2015 Annual IEEE India Conference (INDICON).

[4]  Adang Suwandi Ahmad,et al.  NAIDS design using ChiMIC-KGS , 2017, 2017 International Symposium on Electronics and Smart Devices (ISESD).

[5]  Roberto Gorrieri,et al.  Foundations of Security Analysis and Design III, FOSAD 2004/2005 Tutorial Lectures , 2005, FOSAD.

[6]  Trio Adiono,et al.  Cognitive artificial intelligence (CAI) software based on knowledge growing system (KGS) for diagnosing heart block and arrythmia , 2017, 2017 6th International Conference on Electrical Engineering and Informatics (ICEEI).

[7]  Arwin Datumaya Wahyudi Sumari,et al.  The implementation of A3S information fusion algorithm for interpreting Dissolved Gas Analysis (DGA) based on Doernenburg Ratio , 2017, 2017 International Symposium on Electronics and Smart Devices (ISESD).

[8]  Adang Suwandi Ahmad,et al.  Cognitive artificial intelligence method for measuring transformer performance , 2016, 2016 Future Technologies Conference (FTC).

[9]  Yu Chen,et al.  A Survey on the Application of FPGAs for Network Infrastructure Security , 2011, IEEE Communications Surveys & Tutorials.

[10]  Richard Mengko,et al.  Direction of ventricle contraction based on precordial lead ECG signal , 2016, 2016 4th International Conference on Cyber and IT Service Management.

[11]  Seddik Bri,et al.  High throughput FPGA Implementation of Data Encryption Standard with time variable sub-keys , 2016 .

[12]  P. Kalpana,et al.  Power analysis attack on 8051 microcontrollers , 2014, 2014 IEEE International Conference on Computational Intelligence and Computing Research.

[13]  Adang Suwandi Ahmad,et al.  Security analysis of BC3 algorithm for differential power analysis attack , 2017, 2017 International Symposium on Electronics and Smart Devices (ISESD).

[14]  Massoud Masoumi,et al.  Novel Approach to Protect Advanced Encryption Standard Algorithm Implementation Against Differential Electromagnetic and Power Analysis , 2015, IEEE Transactions on Information Forensics and Security.

[15]  Adang Suwandi Ahmad,et al.  Design of an AES Device as Device Under Test in a DPA Attack , 2018, Int. J. Netw. Secur..

[16]  E. LESTER SMITH,et al.  AND OTHERS , 2005 .

[17]  S. Venkateswarlu,et al.  An Overview of Acoustic Side-Channel Attack , 2013 .

[18]  Adang Suwandi Ahmad,et al.  DPA-countermeasure with knowledge growing system , 2016, 2016 International Symposium on Electronics and Smart Devices (ISESD).

[19]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[20]  S. Venkateswarlu,et al.  Security against Timing Analysis Attack , 2015 .

[21]  Trio Adiono,et al.  Implementation Knowledge Growing System Algorithm using VHDL , 2016, 2016 International Symposium on Electronics and Smart Devices (ISESD).

[22]  Srivaths Ravi,et al.  Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..

[23]  Adang Suwandi Ahmad,et al.  Power analysis attack on implementation of DES , 2016, 2016 International Conference on Information Technology Systems and Innovation (ICITSI).

[24]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[25]  A. Arivazhagan,et al.  RTL Modelling for the Cipher Blcok Chaining Mode (Cbc) for Data Security , 2017 .

[26]  François-Xavier Standaert,et al.  A Tutorial on Physical Security and Side-Channel Attacks , 2004, FOSAD.

[27]  Ingrid Verbauwhede,et al.  Empirical comparison of side channel analysis distinguishers on DES in hardware , 2009, 2009 European Conference on Circuit Theory and Design.

[28]  Christophe Clavier,et al.  Correlation Power Analysis with a Leakage Model , 2004, CHES.

[29]  Sylvain Guilley,et al.  SoCs security: a war against side-channels , 2004, Ann. des Télécommunications.

[30]  Adang Suwandi Ahmad,et al.  Attacking AES-Masking Encryption Device with Correlation Power Analysis , 2018, Int. J. Commun. Networks Inf. Secur..

[31]  Sylvain Guilley,et al.  Common framework to evaluate modern embedded systems against side-channel attacks , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).

[32]  Fengqi Yu,et al.  Enhanced Correlation Power Analysis Attack on Smart Card , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[33]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .