مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

509
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor

Pages

  39-48

Abstract

 In our days, the need for secure protocols and devices seems to be one of the most important issues in the communication systems. Template attacks is a powerful kind of simple power analysis attack that is able to effectively identify and retrieve efficiently the instructions executed by a typical processor and the Hamming weight of their operands. It is usually carried out by using templates that are created from the samples of power consumed by the device on a test platform and statistical analysis of real measurements. This paper describes practical implementation of this attack against the realization of the Advanced Encryption Standard (AES) on ARM-LPC processor. In order to mount the attack, the power samples of the cryptoprocessor processor during the execution of the AES was recorded and exported to the feature extraction and reduction algorithm. Then, the reduced samples were categorized using the machine learning algorithm. Due to more complex architecture, lower power consumption and larger number of pipeline stages compared to other microprocessors which make the attack more difficult, practical implementation of this attack on ARM processor has received less attention in related articles. The main contribution of this paper is efficient use of Machine Intelligence in improving the attack performance such that the improved attack is able to recover the Hamming weight of the output of the first AES SBox with 77% success rate and correct identification of the instructions of the processor with 55% success rate in average.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    Dehghan Menshadi, a., Vafa, s., & MASOUMI, M.. (2019). A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor. JOURNAL OF ELECTRONIC AND CYBER DEFENCE, 7(1 (25) ), 39-48. SID. https://sid.ir/paper/243104/en

    Vancouver: Copy

    Dehghan Menshadi a., Vafa s., MASOUMI M.. A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor. JOURNAL OF ELECTRONIC AND CYBER DEFENCE[Internet]. 2019;7(1 (25) ):39-48. Available from: https://sid.ir/paper/243104/en

    IEEE: Copy

    a. Dehghan Menshadi, s. Vafa, and M. MASOUMI, “A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor,” JOURNAL OF ELECTRONIC AND CYBER DEFENCE, vol. 7, no. 1 (25) , pp. 39–48, 2019, [Online]. Available: https://sid.ir/paper/243104/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button