Wednesday, April 24, 2019

power analysis


  • In cryptography, power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device (such as a smart card, tamper-resistant "black box", or integrated circuit). The attack can non-invasively extract cryptographic keys and other secret information from the device.


Simple power analysis (SPA) involves visually interpreting power traces, or graphs of electrical activity over time.
Differential power analysis (DPA) is a more advanced form of power analysis, which can allow an attacker to compute the intermediate values within cryptographic computations through statistical analysis of data collected from multiple cryptographic operations
https://en.wikipedia.org/wiki/Power_analysis


  • Using this information, the DPA attack uses the following steps:


    Use the current/previous plaintexts and ciphertexts to calculate four different possible AES inputs (the inputs for ECB, CBC, CFB, and OFB modes)
    For each of these calculated inputs, use one bit of the input to split the traces into two groups
    Calculate an average trace for each group and subtract them to get four differential traces
    Look at the differences to decide which mode is most likely:
        If one of the differential traces shows a large spike, the target is probably using that mode
        If none of the differential traces has a large spike, the target is probably using CTR mode
https://wiki.newae.com/Investigating_Block_Cipher_Modes_with_DPA


No comments:

Post a Comment