A weighted statistical analysis of DPA attack on an ASIC AES implementation

Gouyu Qian, Ying Zhou, Yueying Xing, Yibo Fan, Yukiyasu Stunoo, Satoshi Goto

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Research on Differential Power Analysis (DPA) is becoming more and more popular nowadays. Against different hardware, DPA attack will lead to different results, e.g. attack on FPGA is easy but on ASIC is relatively difficult. However, how could we draw the conclusion that we finish a successful attack? How to build the connection between result data and successful rate is a meaningful topic. Same data with different statistical processing method will lead to different results. In this paper, wefocus on DPA attack against an ASIC implementation. We analyzed two current statistical methods, pointed out the limitations. Then, we proposed a weighted statistical analysis method. According to number oftraces and repetitions, we adjust the weight value. Finally, we improved the accuracy and efficiency of DPA attack on ASIC by reducing the number of traces used in attack.

Original languageEnglish
Title of host publicationASICON 2009 - Proceedings 2009 8th IEEE International Conference on ASIC
Pages906-909
Number of pages4
DOIs
Publication statusPublished - 2009
Event2009 8th IEEE International Conference on ASIC, ASICON 2009 - Changsha
Duration: 2009 Oct 202009 Oct 23

Other

Other2009 8th IEEE International Conference on ASIC, ASICON 2009
CityChangsha
Period09/10/2009/10/23

Fingerprint

Application specific integrated circuits
Statistical methods
Field programmable gate arrays (FPGA)
Hardware
Processing
Side channel attack

Keywords

  • AES
  • ASIC
  • Differential power analysis
  • Repetition number weight
  • Trace number weight

ASJC Scopus subject areas

  • Hardware and Architecture
  • Electrical and Electronic Engineering

Cite this

Qian, G., Zhou, Y., Xing, Y., Fan, Y., Stunoo, Y., & Goto, S. (2009). A weighted statistical analysis of DPA attack on an ASIC AES implementation. In ASICON 2009 - Proceedings 2009 8th IEEE International Conference on ASIC (pp. 906-909). [5351546] https://doi.org/10.1109/ASICON.2009.5351546

A weighted statistical analysis of DPA attack on an ASIC AES implementation. / Qian, Gouyu; Zhou, Ying; Xing, Yueying; Fan, Yibo; Stunoo, Yukiyasu; Goto, Satoshi.

ASICON 2009 - Proceedings 2009 8th IEEE International Conference on ASIC. 2009. p. 906-909 5351546.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Qian, G, Zhou, Y, Xing, Y, Fan, Y, Stunoo, Y & Goto, S 2009, A weighted statistical analysis of DPA attack on an ASIC AES implementation. in ASICON 2009 - Proceedings 2009 8th IEEE International Conference on ASIC., 5351546, pp. 906-909, 2009 8th IEEE International Conference on ASIC, ASICON 2009, Changsha, 09/10/20. https://doi.org/10.1109/ASICON.2009.5351546
Qian G, Zhou Y, Xing Y, Fan Y, Stunoo Y, Goto S. A weighted statistical analysis of DPA attack on an ASIC AES implementation. In ASICON 2009 - Proceedings 2009 8th IEEE International Conference on ASIC. 2009. p. 906-909. 5351546 https://doi.org/10.1109/ASICON.2009.5351546
Qian, Gouyu ; Zhou, Ying ; Xing, Yueying ; Fan, Yibo ; Stunoo, Yukiyasu ; Goto, Satoshi. / A weighted statistical analysis of DPA attack on an ASIC AES implementation. ASICON 2009 - Proceedings 2009 8th IEEE International Conference on ASIC. 2009. pp. 906-909
@inproceedings{157222be73fe4085a540f3acc803c43f,
title = "A weighted statistical analysis of DPA attack on an ASIC AES implementation",
abstract = "Research on Differential Power Analysis (DPA) is becoming more and more popular nowadays. Against different hardware, DPA attack will lead to different results, e.g. attack on FPGA is easy but on ASIC is relatively difficult. However, how could we draw the conclusion that we finish a successful attack? How to build the connection between result data and successful rate is a meaningful topic. Same data with different statistical processing method will lead to different results. In this paper, wefocus on DPA attack against an ASIC implementation. We analyzed two current statistical methods, pointed out the limitations. Then, we proposed a weighted statistical analysis method. According to number oftraces and repetitions, we adjust the weight value. Finally, we improved the accuracy and efficiency of DPA attack on ASIC by reducing the number of traces used in attack.",
keywords = "AES, ASIC, Differential power analysis, Repetition number weight, Trace number weight",
author = "Gouyu Qian and Ying Zhou and Yueying Xing and Yibo Fan and Yukiyasu Stunoo and Satoshi Goto",
year = "2009",
doi = "10.1109/ASICON.2009.5351546",
language = "English",
isbn = "9781424438686",
pages = "906--909",
booktitle = "ASICON 2009 - Proceedings 2009 8th IEEE International Conference on ASIC",

}

TY - GEN

T1 - A weighted statistical analysis of DPA attack on an ASIC AES implementation

AU - Qian, Gouyu

AU - Zhou, Ying

AU - Xing, Yueying

AU - Fan, Yibo

AU - Stunoo, Yukiyasu

AU - Goto, Satoshi

PY - 2009

Y1 - 2009

N2 - Research on Differential Power Analysis (DPA) is becoming more and more popular nowadays. Against different hardware, DPA attack will lead to different results, e.g. attack on FPGA is easy but on ASIC is relatively difficult. However, how could we draw the conclusion that we finish a successful attack? How to build the connection between result data and successful rate is a meaningful topic. Same data with different statistical processing method will lead to different results. In this paper, wefocus on DPA attack against an ASIC implementation. We analyzed two current statistical methods, pointed out the limitations. Then, we proposed a weighted statistical analysis method. According to number oftraces and repetitions, we adjust the weight value. Finally, we improved the accuracy and efficiency of DPA attack on ASIC by reducing the number of traces used in attack.

AB - Research on Differential Power Analysis (DPA) is becoming more and more popular nowadays. Against different hardware, DPA attack will lead to different results, e.g. attack on FPGA is easy but on ASIC is relatively difficult. However, how could we draw the conclusion that we finish a successful attack? How to build the connection between result data and successful rate is a meaningful topic. Same data with different statistical processing method will lead to different results. In this paper, wefocus on DPA attack against an ASIC implementation. We analyzed two current statistical methods, pointed out the limitations. Then, we proposed a weighted statistical analysis method. According to number oftraces and repetitions, we adjust the weight value. Finally, we improved the accuracy and efficiency of DPA attack on ASIC by reducing the number of traces used in attack.

KW - AES

KW - ASIC

KW - Differential power analysis

KW - Repetition number weight

KW - Trace number weight

UR - http://www.scopus.com/inward/record.url?scp=77949419116&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77949419116&partnerID=8YFLogxK

U2 - 10.1109/ASICON.2009.5351546

DO - 10.1109/ASICON.2009.5351546

M3 - Conference contribution

SN - 9781424438686

SP - 906

EP - 909

BT - ASICON 2009 - Proceedings 2009 8th IEEE International Conference on ASIC

ER -