Analysis of improved side channel attack on AES-128 with masking

Encryption is a widely used practice of data security in both transit and storage, in many applications. The Advanced Encryption Standard (AES) is the gold standard of encryption and is rated to be highly secured. Side Channel Attack is a type of cyber-attack that can exploit and reveal the secret k...

Full description

Bibliographic Details
Main Author: Tan, Ri Zheng
Other Authors: Gwee Bah Hwee
Format: Final Year Project (FYP)
Language:English
Published: 2019
Subjects:
Online Access:http://hdl.handle.net/10356/77795
_version_ 1811689325244448768
author Tan, Ri Zheng
author2 Gwee Bah Hwee
author_facet Gwee Bah Hwee
Tan, Ri Zheng
author_sort Tan, Ri Zheng
collection NTU
description Encryption is a widely used practice of data security in both transit and storage, in many applications. The Advanced Encryption Standard (AES) is the gold standard of encryption and is rated to be highly secured. Side Channel Attack is a type of cyber-attack that can exploit and reveal the secret keys used for the AES encryption. Correlation Power Analysis (CPA) is the most efficient type of SCA, relative to the other SCA types, Simple Power Analysis (SPA) and Differential Power Analysis. Masking of ciphers is a form of countermeasure against SCA. It is particularly effective against CPA since its implementation decorrelates the power trace from the leakage model. AES-128 with masking is capable of resisting CPA. However, many methods to improve SCA have been proposed over the recent years. This research was conducted to analyse whether SCA implementations can be improved to break the AES-128 cipher with masking. A software designed for SCA was utilised, and tests were conducted on two attack scenarios. A last round Side Channel Attack using CPA was used against a Look-Up-Table (LUT) based AES S-Box implementation, with countermeasures and improvements being made on both ends as required. Vulnerability of the normal and masked AES was evaluated using Signal-to-Noise Ratio power trace analysis. Conclusions on the vulnerability of masked AES against SCA were made based on the results from the attack scenarios, and the observations made on the weak points of the AES encryption through SNR analysis. The experimental results verified the effectiveness of proposed masking scheme implemented on AES-128 against a CPA attack. While SCA was successful against an unprotected AES within 4000 traces of data, the proposed masked AES was highly robust against a CPA attack, where an adversary could not attack said implementation even after collecting 400% more traces of data for the attack. The proposed masked implementation was resilient against SCA with >16000 traces of data.
first_indexed 2024-10-01T05:46:18Z
format Final Year Project (FYP)
id ntu-10356/77795
institution Nanyang Technological University
language English
last_indexed 2024-10-01T05:46:18Z
publishDate 2019
record_format dspace
spelling ntu-10356/777952023-07-07T16:44:42Z Analysis of improved side channel attack on AES-128 with masking Tan, Ri Zheng Gwee Bah Hwee School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering Encryption is a widely used practice of data security in both transit and storage, in many applications. The Advanced Encryption Standard (AES) is the gold standard of encryption and is rated to be highly secured. Side Channel Attack is a type of cyber-attack that can exploit and reveal the secret keys used for the AES encryption. Correlation Power Analysis (CPA) is the most efficient type of SCA, relative to the other SCA types, Simple Power Analysis (SPA) and Differential Power Analysis. Masking of ciphers is a form of countermeasure against SCA. It is particularly effective against CPA since its implementation decorrelates the power trace from the leakage model. AES-128 with masking is capable of resisting CPA. However, many methods to improve SCA have been proposed over the recent years. This research was conducted to analyse whether SCA implementations can be improved to break the AES-128 cipher with masking. A software designed for SCA was utilised, and tests were conducted on two attack scenarios. A last round Side Channel Attack using CPA was used against a Look-Up-Table (LUT) based AES S-Box implementation, with countermeasures and improvements being made on both ends as required. Vulnerability of the normal and masked AES was evaluated using Signal-to-Noise Ratio power trace analysis. Conclusions on the vulnerability of masked AES against SCA were made based on the results from the attack scenarios, and the observations made on the weak points of the AES encryption through SNR analysis. The experimental results verified the effectiveness of proposed masking scheme implemented on AES-128 against a CPA attack. While SCA was successful against an unprotected AES within 4000 traces of data, the proposed masked AES was highly robust against a CPA attack, where an adversary could not attack said implementation even after collecting 400% more traces of data for the attack. The proposed masked implementation was resilient against SCA with >16000 traces of data. Bachelor of Engineering (Electrical and Electronic Engineering) 2019-06-06T07:13:20Z 2019-06-06T07:13:20Z 2019 Final Year Project (FYP) http://hdl.handle.net/10356/77795 en Nanyang Technological University 70 p. application/pdf
spellingShingle DRNTU::Engineering::Electrical and electronic engineering
Tan, Ri Zheng
Analysis of improved side channel attack on AES-128 with masking
title Analysis of improved side channel attack on AES-128 with masking
title_full Analysis of improved side channel attack on AES-128 with masking
title_fullStr Analysis of improved side channel attack on AES-128 with masking
title_full_unstemmed Analysis of improved side channel attack on AES-128 with masking
title_short Analysis of improved side channel attack on AES-128 with masking
title_sort analysis of improved side channel attack on aes 128 with masking
topic DRNTU::Engineering::Electrical and electronic engineering
url http://hdl.handle.net/10356/77795
work_keys_str_mv AT tanrizheng analysisofimprovedsidechannelattackonaes128withmasking