[Resource Topic] 2014/899: Side Channel Power Analysis of an AES-256 Bootloader

Welcome to the resource topic for 2014/899

Title:
Side Channel Power Analysis of an AES-256 Bootloader

Authors: Colin O'Flynn, Zhizhang Chen

Abstract:

Side Channel Attacks (SCA) using power measurements are a known method of breaking cryptographic algorithms such as AES. Published research into attacks on AES frequently target only AES-128, and often target only the core Electronic Code-Book (ECB) algorithm, without discussing surrounding issues such as triggering, along with breaking the initialization vector. This paper demonstrates a complete attack on a secure bootloader, where the firmware files have been encrypted with AES-256-CBC. A classic Correlation Power Analysis (CPA) attack is performed on AES-256 to recover the complete 32-byte key, and a CPA attack is also used to attempt recovery of the initialization vector (IV).

ePrint: https://eprint.iacr.org/2014/899

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .