Přístupnostní navigace
E-application
Search Search Close
Applied result detail
MARTINÁSEK, Z.; ZAPLETAL, O.; MALINA, L.
Original Title
Attack DPA Contest
English Title
Type
Software
Abstract
The program realizes a power analysis attack for DPA contest v4 (http://www.dpacontest.org/v4/index.php). Target implementation is a masked AES-256 implemented in software on an Atmel ATMega-163 smart card. This implementation is called AES-256 RSM (Rotating Sbox Masking). Our implementation of attack consists of two basic steps (see Fig.1). In the first step, the secret offset of AES RSM is revealed by MLP trained (Multi-Layer Perceptron) from power traces. In the second step, classical differential power analysis (DPA) based on correlation coefficient reveals secret key stored in cryptographic device. Targeting intermediate value during the DPA is output of SubBytes function in the first round. Attack needs about 20 power traces to obtain whole secret key.
Abstract in English
Keywords
DPA Contest, power analysis, MLP, SCA
Key words in English
Location
Ústav telekomunikací, Technická 12, 616 00 Brno
Possibilities of use
only the provider uses the result
Licence fee
In order to use the result by another entity, it is always necessary to acquire a license
www
http://crypto.utko.feec.vutbr.cz/?page_id=54#6