Design of an AES Device as Device Under Test in a DPA Attack

This paper presents a design for the implementation of the AES encryption algorithm in the hardware system. The proposed device is intended to be a device under test in a differential power analysis (DPA) attack. This device uses AES encryption with 128bit key length and electronic codebook (ECB) mode. The platform used in this device is FPGACyclone IV EP4CE115F29C7. AESAVS is used to test the functionality of the device. This study proposes a design for an AES-128 encryption device synthesized in the Quartus IDE. It will feature support conducting side-channel attacks on real condition.

[1]  Massoud Masoumi,et al.  Efficient implementation of masked AES on Side-Channel Attack Standard Evaluation Board , 2015, 2015 International Conference on Information Society (i-Society).

[2]  Minsu Choi,et al.  Measurement and Evaluation of Power Analysis Attacks on Asynchronous S-Box , 2012, IEEE Transactions on Instrumentation and Measurement.

[3]  Srivaths Ravi,et al.  Tamper resistance mechanisms for secure embedded systems , 2004, 17th International Conference on VLSI Design. Proceedings..

[4]  Srivaths Ravi,et al.  Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..

[5]  Jorge Nakahara Analysis of Venkaiah et al.'s AES Design , 2009, Int. J. Netw. Secur..

[6]  Adang Suwandi Ahmad,et al.  DPA-countermeasure with knowledge growing system , 2016, 2016 International Symposium on Electronics and Smart Devices (ISESD).

[7]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[8]  Onkar S. Dhede,et al.  A review: Hardware Implementation of AES using minimal resources on FPGA , 2015, 2015 International Conference on Pervasive Computing (ICPC).

[9]  Cheng-Chi Lee,et al.  Cryptanalysis and improvement on batch verifying multiple RSA digital signatures , 2006, Appl. Math. Comput..

[10]  Chin-Chen Chang,et al.  A new key assignment scheme for enforcing complicated access control policies in hierarchy , 2003, Future Gener. Comput. Syst..

[11]  Nidhi Goel,et al.  FPGA implementation of an 8-bit AES architecture: A rolled and masked S-Box approach , 2015, 2015 Annual IEEE India Conference (INDICON).

[12]  Sylvain Guilley,et al.  Common framework to evaluate modern embedded systems against side-channel attacks , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).

[13]  Manfred Glesner,et al.  An FPGA implementation of the AES-Rijndael in OCB/ECB modes of operation , 2005, Microelectron. J..

[14]  Kailash J. Karande,et al.  Area optimized implementation of AES algorithm on FPGA , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).

[15]  Min-Shiang Hwang,et al.  Challenges in E-Government and Security of Information , 2004 .

[16]  Miguel A. Vega-Rodríguez,et al.  A new methodology to implement the AES algorithm using partial and dynamic reconfiguration , 2010, Integr..

[17]  Gulom Numovych Tuychiev The Encryption Algorithms GOST28147–89–IDEA8–4 and GOST28147–89–RFWKIDEA8–4 , 2017 .

[18]  A. Satoh,et al.  Side-Channel Attack Standard Evaluation Board SASEBO-W for Smartcard Testing , 2011 .

[19]  Selçuk Köse,et al.  A Voltage Regulator-Assisted Lightweight AES Implementation Against DPA Attacks , 2016, IEEE Transactions on Circuits and Systems I: Regular Papers.

[20]  Jovan Dj. Golic,et al.  Multiplicative Masking and Power Analysis of AES , 2002, CHES.

[21]  Adang Suwandi Ahmad,et al.  Power analysis attack on implementation of DES , 2016, 2016 International Conference on Information Technology Systems and Innovation (ICITSI).

[22]  Garrett S. Rose,et al.  Power Profile Obfuscation Using Nanoscale Memristive Devices to Counter DPA Attacks , 2015, IEEE Transactions on Nanotechnology.