Cryptology ePrint Archive: Report 2020/1008
Differential Power Analysis Attacks on Different Implementations of AES with the ChipWhisperer Nano
Leah Lathrop
Abstract: Side-channel attacks exploit information that is leaked from hardware. The differential power analysis (DPA) attack aims at extracting sensitive information that is processed by the operations in a cryptographic primitive. Power traces are collected and subsequently processed using statistical methods. The ChipWhisperer Nano is a low-cost, open-source device that
can be used to implement and study side-channel attacks. This paper describes how the DPA attack with the difference of means method can be used to extract the secret key from both an 8-bit and a 32-bit implementation of AES using the ChipWhisperer Nano. The results show that although it is possible to carry out the attack on both implementations, the attack on the 32-bit implementation requires more traces than the 8-bit implementation.
Category / Keywords: applications / side-channel analysis, differential power analysis, ChipWhisperer, Hardware Security
Date: received 20 Aug 2020, last revised 22 Aug 2020
Contact author: l lathrop at oth-aw de
Available format(s): PDF | BibTeX Citation
Note: This paper was written as an assignment for a cryptography lecture. I am publishing it here because I think it might help someone who is getting started on studying side-channel attacks.
Version: 20200822:215432 (All versions of this report)
Short URL: ia.cr/2020/1008
[ Cryptology ePrint archive ]