[Resource Topic] 2020/1008: Differential Power Analysis Attacks on Different Implementations of AES with the ChipWhisperer Nano

Welcome to the resource topic for 2020/1008

Title:
Differential Power Analysis Attacks on Different Implementations of AES with the ChipWhisperer Nano

Authors: Leah Lathrop

Abstract:

Side-channel attacks exploit information that is leaked from hardware. The differential power analysis (DPA) attack aims at extracting sensitive information that is processed by the operations in a cryptographic primitive. Power traces are collected and subsequently processed using statistical methods. The ChipWhisperer Nano is a low-cost, open-source device that can be used to implement and study side-channel attacks. This paper describes how the DPA attack with the difference of means method can be used to extract the secret key from both an 8-bit and a 32-bit implementation of AES using the ChipWhisperer Nano. The results show that although it is possible to carry out the attack on both implementations, the attack on the 32-bit implementation requires more traces than the 8-bit implementation.

ePrint: https://eprint.iacr.org/2020/1008

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .