Abstract
We describe an SPA power attack on an 8-bit implementation of AES. Our attack uses an optimized search of the key space to improve upon previous work in terms of speed, flexibility, and handling of data error. We can find a 128-bit cipher key in 16ms on average, with similar results for 192- and 256-bit cipher keys. The attack almost always produces a unique cipher key and performs well even in the presence of substantial measurement error.
Chapter PDF
Similar content being viewed by others
Keywords
References
E. Biham and A. Shamir. Power analysis of the key scheduling of the AES candidates. In Second Advanced Encryption Standard (AES) Candidate Conference, 1999.
S. Chari, C. Jutla, J.R. Rao, and P. Rohatgi. A cautionary note regarding evaluation of AES candidates on smart-cards. In Second Advanced Encryption Standard (AES) Candidate Conference, 1999.
Joan Daemen and Vincent Rijmen. The Design of Rijndael. Springer-Verlag, 2002.
Paul C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In CRYPTO, pages 104–113, 1996.
Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Differential power analysis. In CRYPTO, pages 388–397, 1999.
Stefan Mangard. A simple power-analysis (SPA) attack on implementations of the aes key expansion. In ICISC, pages 343–358, 2002.
Rita Mayer-Sommer. Smartly analyzing the simplicity and the power of simple power analysis on smartcards. In CHES, pages 78–92, 2000.
Jan M. Rabaey. Digital Integrated Circuits: a Design Perspective. Prentice-Hall, Inc., second edition, 2002.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this paper
Cite this paper
VanLaven, J., Brehob, M., Compton, K.J. (2005). A Computationally Feasible SPA Attack on AES VIA Optimized Search. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds) Security and Privacy in the Age of Ubiquitous Computing. SEC 2005. IFIP Advances in Information and Communication Technology, vol 181. Springer, Boston, MA. https://doi.org/10.1007/0-387-25660-1_38
Download citation
DOI: https://doi.org/10.1007/0-387-25660-1_38
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-25658-0
Online ISBN: 978-0-387-25660-3
eBook Packages: Computer ScienceComputer Science (R0)