Paper 2014/899
Side Channel Power Analysis of an AES-256 Bootloader
Colin O'Flynn and Zhizhang Chen
Abstract
Side Channel Attacks (SCA) using power measurements are a known method of breaking cryptographic algorithms such as AES. Published research into attacks on AES frequently target only AES-128, and often target only the core Electronic Code-Book (ECB) algorithm, without discussing surrounding issues such as triggering, along with breaking the initialization vector. This paper demonstrates a complete attack on a secure bootloader, where the firmware files have been encrypted with AES-256-CBC. A classic Correlation Power Analysis (CPA) attack is performed on AES-256 to recover the complete 32-byte key, and a CPA attack is also used to attempt recovery of the initialization vector (IV).
Note: Revised to reflect final published version, add copyright notice
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. CCECE 2015 - IEEE Canadian Conference on Electrical and Computer Engineering
- Keywords
- side channelpower analysisAES256
- Contact author(s)
- coflynn @ newae com
- History
- 2015-03-19: last of 2 revisions
- 2014-10-30: received
- See all versions
- Short URL
- https://ia.cr/2014/899
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/899, author = {Colin O'Flynn and Zhizhang Chen}, title = {Side Channel Power Analysis of an {AES}-256 Bootloader}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/899}, year = {2014}, url = {https://eprint.iacr.org/2014/899} }