نوع مقاله : مقاله پژوهشی
نویسندگان
1 کارشناس ارشد مخابرات، دانشگاه تربیت مدرس
2 دانشجوی دکتری الکترونیک دانشگاه آزاد اسلامی واحد تهران غرب
3 استادیار دانشکده فنی دانشگاه آزاد اسلامی واحد اسلامشهر
چکیده
کلیدواژهها
عنوان مقاله [English]
نویسندگان [English]
In our days, the need for secure protocols and devices seems to be one of the most important issues in the communication systems. Template attacks is a powerful kind of simple power analysis attack that is able to effectively identify and retrieve efficiently the instructions executed by a typical processor and the Hamming weight of their operands. It is usually carried out by using templates that are created from the samples of power consumed by the device on a test platform and statistical analysis of real measurements. This paper describes practical implementation of this attack against the realization of the Advanced Encryption Standard (AES) on ARM-LPC processor. In order to mount the attack, the power samples of the cryptoprocessor processor during the execution of the AES was recorded and exported to the feature extraction and reduction algorithm. Then, the reduced samples were categorized using the machine learning algorithm. Due to more complex architecture, lower power consumption and larger number of pipeline stages compared to other microprocessors which make the attack more difficult, practical implementation of this attack on ARM processor has received less attention in related articles. The main contribution of this paper is efficient use of machine intelligence in improving the attack performance such that the improved attack is able to recover the Hamming weight of the output of the first AES SBox with 77% success rate and correct identification of the instructions of the processor with 55% success rate in average.
کلیدواژهها [English]