Side channel attack on RSM (Rotating S-box Masking)
Publish place: 7th International Conference on Information Technology, Computer and Telecommunication
Publish Year: 1398
نوع سند: مقاله کنفرانسی
زبان: English
View: 709
This Paper With 12 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
ITCT07_002
تاریخ نمایه سازی: 2 دی 1398
Abstract:
Cryptography was created to prevent unauthorized access to sensitive information, thus it causes to generate a variety of cryptographic algorithms. In each encryption algorithm, there is a key that encoder only has it. This key is used to reverse encryption and so-called decryption. Advanced Encryption Standard (AES) is a symmetric cryptographic algorithm. Various attacks have been performed on the AES encryption algorithm such as differential power analysis (DPA). Differential power analysis attack finds the key by using the relationship between power consumption and intermediate data. To prevent this attack, many countermeasures have been presented such as masking. This countermeasure removes the relationship between power consumption and intermediate data by masking the intermediate data. In this research, we presented a new approach that can break the RSM countermeasure using the DPA attack. In fact, by using the pattern recognition algorithms, the trace with the same mask are grouped into distinct categories, and then, with the DPA attack, can be guessed the mask in addition to the key. So, in this way can be attacked to RSM.
Keywords:
Authors
Mojtaba Gazmeh
Department of Computer Engineering, Shahed University, Tehran, Iran
Mohammad Ali Doostari
Department of Computer Engineering, Shahed University, Tehran, Iran