Attacking AES-Masking Encryption Device with Correlation Power Analysis

Authors

  • Septafiansyah Dwi Putra School of Electrical Engineering and Informatics, Institut Teknologi Bandung
  • Adang Suwandi Ahmad School of Electrical Engineering and Informatics, Institut Teknologi Bandung
  • Sarwono Sutikno School of Electrical Engineering and Informatics, Institut Teknologi Bandung
  • Yusuf Kurniawan School of Electrical Engineering and Informatics, Institut Teknologi Bandung

DOI:

https://doi.org/10.17762/ijcnis.v10i2.2884

Abstract

Modern communication system use cryptography algorithm to ensure data still confidentiality, integrity, and authentic. There is a new vulnerability in a cryptographic algorithm when implemented on a hardware device. This vulnerability is considered capable of uncovering a secret key used in a cryptographic algorithm. This technique is known as a power analysis attack. Previous and other research introduces countermeasure to countering this new vulnerability. Some researchers suggest using logic level with encoding the AES. The countermeasure using logic is meager cost and efficient. The contribution of this paper is to analyze CPA on encryption device that has been given logic level countermeasure. Our finding of this paper is the use of encoding with one-hot masking technique does not provide the maximum countermeasure effect against CPA-based attacks. In this research, CPA attack can be successfully revealing the AES secret-key

Downloads

Published

2018-08-08 — Updated on 2022-04-17

Versions

How to Cite

Putra, S. D., Ahmad, A. S., Sutikno, S., & Kurniawan, Y. (2022). Attacking AES-Masking Encryption Device with Correlation Power Analysis. International Journal of Communication Networks and Information Security (IJCNIS), 10(2). https://doi.org/10.17762/ijcnis.v10i2.2884 (Original work published August 8, 2018)

Issue

Section

Research Articles