TY - JOUR
T1 - Correlation power analysis of modes of encryption in AES and its countermeasures
AU - Fahd, Shah
AU - Afzal, Mehreen
AU - Abbas, Haider
AU - Iqbal, Waseem
AU - Waheed, Salman
N1 - Publisher Copyright:
© 2017 Elsevier B.V.
PY - 2018/6
Y1 - 2018/6
N2 - Secure implementation of cryptographic algorithms is an important area of research. Cryptographer prefers to secure algorithms against known attacks; however designer focuses on efficient implementation. It has been established in several researches that an attack on implementation of a cipher requires far less effort than exploiting mathematical weakness of the structure. Implementation vulnerabilities are utilized by side channel attacks (SCA). In practical environment a block cipher is implemented in one of the modes of encryption like ECB, CBC, CTR. Our research focuses on finding leakage points in different modes of encryption including GCM to build hypothetical power consumption model for correlation power analysis (CPA) attack. CPA is simulated on AES-128-ECB in PIC18F4520 which yields secret key extraction in 2346 traces. Algorithmic level countermeasures for Counter mode and GCM mode are also presented. Proposed Counter and GCM mode implementation in FPGA yields 0.179% and 6.66% area overhead respectively. Authentication structure of proposed GCM is tolerant against fault injection attacks and propagates error with high probability. Single bit modifies approximately 51% bits in subsequent multiplications and disturbing the Tag by 48%. This research also highlights future recommendations for designing new resilient modes of encryption against power analysis attacks.
AB - Secure implementation of cryptographic algorithms is an important area of research. Cryptographer prefers to secure algorithms against known attacks; however designer focuses on efficient implementation. It has been established in several researches that an attack on implementation of a cipher requires far less effort than exploiting mathematical weakness of the structure. Implementation vulnerabilities are utilized by side channel attacks (SCA). In practical environment a block cipher is implemented in one of the modes of encryption like ECB, CBC, CTR. Our research focuses on finding leakage points in different modes of encryption including GCM to build hypothetical power consumption model for correlation power analysis (CPA) attack. CPA is simulated on AES-128-ECB in PIC18F4520 which yields secret key extraction in 2346 traces. Algorithmic level countermeasures for Counter mode and GCM mode are also presented. Proposed Counter and GCM mode implementation in FPGA yields 0.179% and 6.66% area overhead respectively. Authentication structure of proposed GCM is tolerant against fault injection attacks and propagates error with high probability. Single bit modifies approximately 51% bits in subsequent multiplications and disturbing the Tag by 48%. This research also highlights future recommendations for designing new resilient modes of encryption against power analysis attacks.
KW - Correlation power analysis
KW - Fault injections
KW - Modes of encryption
KW - Number of traces
KW - Random S-box
KW - Side channel analysis
KW - Signal to noise ratio
UR - http://www.scopus.com/inward/record.url?scp=85026377131&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85026377131&partnerID=8YFLogxK
U2 - 10.1016/j.future.2017.06.004
DO - 10.1016/j.future.2017.06.004
M3 - Article
AN - SCOPUS:85026377131
SN - 0167-739X
VL - 83
SP - 496
EP - 509
JO - Future Generation Computer Systems
JF - Future Generation Computer Systems
ER -