Attacking AES-Masking Encryption Device with Correlation Power Analysis

Main Article Content

Septafiansyah Dwi Putra
Adang Suwandi Ahmad
Sarwono Sutikno
Yusuf Kurniawan


Modern communication system use cryptography algorithm to ensure data still confidentiality, integrity, and authentic. There is a new vulnerability in a cryptographic algorithm when implemented on a hardware device. This vulnerability is considered capable of uncovering a secret key used in a cryptographic algorithm. This technique is known as a power analysis attack. Previous and other research introduces countermeasure to countering this new vulnerability. Some researchers suggest using logic level with encoding the AES. The countermeasure using logic is meager cost and efficient. The contribution of this paper is to analyze CPA on encryption device that has been given logic level countermeasure. Our finding of this paper is the use of encoding with one-hot masking technique does not provide the maximum countermeasure effect against CPA-based attacks. In this research, CPA attack can be successfully revealing the AES secret-key

Article Details

How to Cite
Putra, S. D., Ahmad, A. S., Sutikno, S., & Kurniawan, Y. (2022). Attacking AES-Masking Encryption Device with Correlation Power Analysis. International Journal of Communication Networks and Information Security (IJCNIS), 10(2). (Original work published August 8, 2018)
Research Articles