NUST Institutional Repository

Correlation Power Analysis of Modes of Encryption

Show simple item record

dc.contributor.author Fahd, Shah
dc.contributor.author Supervised by Dr. Mehreen Afzal.
dc.date.accessioned 2020-10-26T07:29:11Z
dc.date.available 2020-10-26T07:29:11Z
dc.date.issued 2016-05
dc.identifier.other TIS-201
dc.identifier.other MSIS-12
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/4933
dc.description.abstract Over the past few years Development in the field of cryptanalysis revealed that compromising implementation of cryptographic algorithm is much easier than targeting algorithm separately. Side channel analysis (SCA) targets implementations by some leakage information. Correlation Power Analysis (CPA) is type of SCA. CPA has successfully compromised many implementations on smart cards, 32 bit architecture and microcontroller platforms. For CPA attack adversary need precise hypothetical power consumption model to extract secret parameters. In this research leakage points are identified in six different modes of encryption i-e ECB, CBC, CFB, OFB, Counter and GCM based upon previous researches. The leakage points can be further used to generate hypothetical vectors for attack. A new model is also defined using Modulo 2 oracle which segregates hamming weights with respect to odd and even values. For proof of concept of extraction of keybytes from ECB mode practical CPA is simulated on AES-128 in 8 Bit PIC Microcontroller. Total 3000 traces are acquired to extract 3 keybytes. Another contribution of this thesis is the analysis of GCM the authenticated mode of encryption against CPA attack. Vulnerability of field multiplication via Look-up tables discovered by Lopez [1] against CPA attack is studied with respect to GCM mode. S-Box role in attack is studied in detail from power analysis point of view. Countermeasures for Counter mode and GCM mode are proposed to resist power analysis attack. This research will help in addressing side channel (Power) vulnerabilities of encryption modes. en_US
dc.language.iso en en_US
dc.publisher MCS en_US
dc.title Correlation Power Analysis of Modes of Encryption en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account