A highly efficient cyber-physical-attack on smart card with AES-128 algorithm implementation

The Advanced Encryption Standard (AES) cipher is the most widely used algorithm used today to secure highly-confidential information. Side-channel attacks (SCA) target implementations of the cipher to reveal the secret keys used for encryption and decryption. Correlation Power Analysis (CPA) is a ty...

Full description

Bibliographic Details
Main Author: Hilos, Carlene Gutierrez
Other Authors: Gwee Bah Hwee
Format: Final Year Project (FYP)
Language:English
Published: 2018
Subjects:
Online Access:http://hdl.handle.net/10356/75504
_version_ 1811693573974786048
author Hilos, Carlene Gutierrez
author2 Gwee Bah Hwee
author_facet Gwee Bah Hwee
Hilos, Carlene Gutierrez
author_sort Hilos, Carlene Gutierrez
collection NTU
description The Advanced Encryption Standard (AES) cipher is the most widely used algorithm used today to secure highly-confidential information. Side-channel attacks (SCA) target implementations of the cipher to reveal the secret keys used for encryption and decryption. Correlation Power Analysis (CPA) is a type of SCA that was selected due to its advantages over other SCA, namely Simple Power Analysis (SPA) and Differential Power Analysis (DPA). Smartcards are just some devices that utilize AES to secure data due to their usage in industries like the military, banking and government. Hence, this project will focus on revealing the secret keys used on AES-128 secured smartcards. SCA were conducted on AES-128 secured smartcards, and the power consumption leaked measured. This data is then inputted into a program designed to successfully reveal the 16 sub-keys used to secure the smartcard. This program was designed to model the AES algorithm, and correlate the derived power model with the actual power consumption leaked. Ultimately, the sub-keys would be revealed according to the highest correlation values. Having utilised a Look-Up-Table (LUT) based AES S-Box implementation, the program is designed to be faster than conventional S-Box implementations. This is because values are pre-computed as opposed to requiring computation during implementation.
first_indexed 2024-10-01T06:53:50Z
format Final Year Project (FYP)
id ntu-10356/75504
institution Nanyang Technological University
language English
last_indexed 2024-10-01T06:53:50Z
publishDate 2018
record_format dspace
spelling ntu-10356/755042023-07-07T17:36:12Z A highly efficient cyber-physical-attack on smart card with AES-128 algorithm implementation Hilos, Carlene Gutierrez Gwee Bah Hwee School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering The Advanced Encryption Standard (AES) cipher is the most widely used algorithm used today to secure highly-confidential information. Side-channel attacks (SCA) target implementations of the cipher to reveal the secret keys used for encryption and decryption. Correlation Power Analysis (CPA) is a type of SCA that was selected due to its advantages over other SCA, namely Simple Power Analysis (SPA) and Differential Power Analysis (DPA). Smartcards are just some devices that utilize AES to secure data due to their usage in industries like the military, banking and government. Hence, this project will focus on revealing the secret keys used on AES-128 secured smartcards. SCA were conducted on AES-128 secured smartcards, and the power consumption leaked measured. This data is then inputted into a program designed to successfully reveal the 16 sub-keys used to secure the smartcard. This program was designed to model the AES algorithm, and correlate the derived power model with the actual power consumption leaked. Ultimately, the sub-keys would be revealed according to the highest correlation values. Having utilised a Look-Up-Table (LUT) based AES S-Box implementation, the program is designed to be faster than conventional S-Box implementations. This is because values are pre-computed as opposed to requiring computation during implementation. Bachelor of Engineering 2018-06-01T01:36:24Z 2018-06-01T01:36:24Z 2018 Final Year Project (FYP) http://hdl.handle.net/10356/75504 en Nanyang Technological University 76 p. application/pdf
spellingShingle DRNTU::Engineering::Electrical and electronic engineering
Hilos, Carlene Gutierrez
A highly efficient cyber-physical-attack on smart card with AES-128 algorithm implementation
title A highly efficient cyber-physical-attack on smart card with AES-128 algorithm implementation
title_full A highly efficient cyber-physical-attack on smart card with AES-128 algorithm implementation
title_fullStr A highly efficient cyber-physical-attack on smart card with AES-128 algorithm implementation
title_full_unstemmed A highly efficient cyber-physical-attack on smart card with AES-128 algorithm implementation
title_short A highly efficient cyber-physical-attack on smart card with AES-128 algorithm implementation
title_sort highly efficient cyber physical attack on smart card with aes 128 algorithm implementation
topic DRNTU::Engineering::Electrical and electronic engineering
url http://hdl.handle.net/10356/75504
work_keys_str_mv AT hiloscarlenegutierrez ahighlyefficientcyberphysicalattackonsmartcardwithaes128algorithmimplementation
AT hiloscarlenegutierrez highlyefficientcyberphysicalattackonsmartcardwithaes128algorithmimplementation