Presentation | 2013-03-07 Side Channel Security Evaluation ofAES Software Implementation by Chosen-Input Method Shohei Saito, Takeshi Kishikawa, Tsutomu Matsumoto, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | It is more important for evaluating the resistance of side-channel attacks which using non-regular information to guess inside secret key. When evaluate side-channel resistance, we take a number of power consumption waveforms and perform side-channel analysis. However, it takes a significant cost. We already proposed "Chosen-Input Method", which can evaluate side-channel security very efficiently when evaluator knows the secret key. We conducted side-channel analysis with this method against hardware implementation AES and we succeeded in guessing secret key very small number of waveforms. In this paper, we apply this method for software implementation. We discuss the difference between hardware implementation and software implementation when applying chosen-input method and we report the result of side-channel analysis experiment for micro controller AVR. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Cryptographic Hardware / Information Security / Side Channel Attack / AVR / CPA / Chosen-Input Method |
Paper # | IT2012-73,ISEC2012-91,WBS2012-59 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2013/2/28(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Side Channel Security Evaluation ofAES Software Implementation by Chosen-Input Method |
Sub Title (in English) | |
Keyword(1) | Cryptographic Hardware |
Keyword(2) | Information Security |
Keyword(3) | Side Channel Attack |
Keyword(4) | AVR |
Keyword(5) | CPA |
Keyword(6) | Chosen-Input Method |
1st Author's Name | Shohei Saito |
1st Author's Affiliation | Graduate School of Environment and Information Sciences() |
2nd Author's Name | Takeshi Kishikawa |
2nd Author's Affiliation | Graduate School of Environment and Information Sciences |
3rd Author's Name | Tsutomu Matsumoto |
3rd Author's Affiliation | Graduate School of Environment and Information Sciences |
Date | 2013-03-07 |
Paper # | IT2012-73,ISEC2012-91,WBS2012-59 |
Volume (vol) | vol.112 |
Number (no) | 461 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |