Bit-Level Differential Power Analysis Attack on Implementations of Advanced Encryption Standard Software Running Inside a PIC18F2420 Microcontroller

Small embedded devices such as microcontrollers have been widely used for identification, authentication, securing and storing confidential information. In all these applications, the security and privacy of the microcontrollers are of crucial importance. To provide strong security to protect data, these devices depend on cryptographic algorithms to ensure confidentiality and integrity of data. Moreover, many algorithms have been proposed, with each one having its strength and weaknesses. This paper presents a Differential Power Analysis(DPA) attack on hardware implementations of Advanced Encryption Standard(AES) running inside a PIC18F2420 microcontroller.

[1]  Dakshi Agrawal,et al.  The EM Side-Channel(s) , 2002, CHES.

[2]  Dengguo Feng,et al.  Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing , 2005, IACR Cryptol. ePrint Arch..

[3]  D. K. Branstad,et al.  Data Encryption Standard: past and future , 1988, Proc. IEEE.

[4]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[5]  Thomas S. Messerges,et al.  Investigations of Power Analysis Attacks on Smartcards , 1999, Smartcard.

[6]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[7]  Ilya Kizhvatov,et al.  Physical Security of Cryptographic Algorithm Implementations , 2011 .

[8]  A. A. Zaidan,et al.  On the Differences between Hiding Information and Cryptography Techniques: An Overview , 2010 .

[9]  Bhekisipho Twala,et al.  Simulation and parameter optimization of polysilicon gate biaxial strained silicon MOSFETs , 2015, 2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC).

[10]  Stefan Mangard,et al.  One for all - all for one: unifying standard differential power analysis attacks , 2011, IET Inf. Secur..

[11]  Jakub Breier,et al.  On Practical Results of the Differential Power Analysis , 2012 .

[12]  Stefan Mangard,et al.  Power analysis attacks - revealing the secrets of smart cards , 2007 .

[13]  F. Nelwamondo,et al.  Survey on the cryptanalysis of wireless sensor networks using side-channel analysis , 2012 .

[14]  Silvio Micali,et al.  Physically Observable Cryptography (Extended Abstract) , 2004, TCC.