Implementation on MicroBlaze of AES algorithm to reveal fake keys against side-channel attacks

dc.contributor.authorLumbiarres López, Rubén
dc.contributor.authorLópez García, Mariano
dc.contributor.authorCanto Navarro, Enrique Fernando
dc.contributor.groupUniversitat Politècnica de Catalunya. SARTI - Centre de Desenvolupament Tecnològic de Sistemes d'Adquisició Remota i Tractament de la Informació
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament d'Enginyeria de Sistemes, Automàtica i Informàtica Industrial
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament d'Enginyeria Electrònica
dc.date.accessioned2014-11-11T07:50:47Z
dc.date.created2014
dc.date.issued2014
dc.description.abstractThis paper presents a new proposal for hiding the cryptographic key, when the so-called side-channel attacks (SCAs) are applied to break the security of AES-128. The algorithm was executed on MicroBlaze, but the proposed method is generic and can be extended to any other microprocessor. SCAs are based on examining the correlation produced between the data and operations performed by the microprocessor and its actual power consumption. Traditionally, such weakness is counteracted by introducing countermeasures addressed to reduce as much as possible this correlation, making data and power consumption independent. On the contrary, the proposal presented in this paper introduces some modifications in the AES algorithm. These changes aim at concealing the true key by reinforcing the correlation coefficient in such a way that a classical attack leads to a false key. This way, the system misleads the attacker and apparently behaves as an unprotected system that, in fact, reveals a false positive. The complete system was built on a Virtex-5 FPGA. Experimental results show the strength of our implementation, which is capable of successfully hiding the true cryptographic key.
dc.description.versionPostprint (published version)
dc.format.extent6 p.
dc.identifier.citationLumbiarres, R.; Lopez, M.; Cantó, E. Implementation on MicroBlaze of AES algorithm to reveal fake keys against side-channel attacks. A: IEEE International Symposium on Industrial Electronics. "IEEE 23rd International Symposium on Industrial Electronics (ISIE 2014): 1-4 June 2014: Grand Cevahir Hotel and Convention Center, Istanbul, Turkey: proceedings". Istanbul: Institute of Electrical and Electronics Engineers (IEEE), 2014, p. 1882-1887.
dc.identifier.doi10.1109/ISIE.2014.6864902
dc.identifier.isbn978-1-4799-2400-4
dc.identifier.urihttps://hdl.handle.net/2117/24664
dc.language.isoeng
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.relation.publisherversionhttp://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6864902
dc.rights.accessRestricted access - publisher's policy
dc.subjectÀrees temàtiques de la UPC::Informàtica::Seguretat informàtica::Criptografia
dc.subject.lcshData encryption (Computer science)
dc.subject.lcshCryptography
dc.subject.lemacEncriptació de dades (Informàtica)
dc.subject.lemacCriptografia
dc.subject.otherCryptography. FPGAs applications
dc.subject.otherMicroBlaze
dc.subject.otherSide-channel attacks
dc.titleImplementation on MicroBlaze of AES algorithm to reveal fake keys against side-channel attacks
dc.typeConference lecture
dspace.entity.typePublication
local.citation.authorLumbiarres, R.; Lopez, M.; Cantó, E.
local.citation.contributorIEEE International Symposium on Industrial Electronics
local.citation.endingPage1887
local.citation.publicationNameIEEE 23rd International Symposium on Industrial Electronics (ISIE 2014): 1-4 June 2014: Grand Cevahir Hotel and Convention Center, Istanbul, Turkey: proceedings
local.citation.pubplaceIstanbul
local.citation.startingPage1882
local.identifier.drac15067833

Fitxers

Paquet original

Mostrant 1 - 1 de 1
Carregant...
Miniatura
Nom:
implementation.pdf
Mida:
531.54 KB
Format:
Adobe Portable Document Format
Descarregar (Accés restringit) Sol·licita una còpia a l'autor