Student Work

Differential Power Analysis Side-Channel Attacks in Cryptography

Public

Downloadable Content

open in viewer

In this project we explore a technique known as dierential power analysis and its strength as an attack in the cryptanalyst's arsenal. We begin by looking into side-channel attacks and how they operate in regards to a cryptosystem. Further, we explore the usage of mathematical models known as the Hamming Weight and Hamming Distance which provide a correlation between a given cryptographic protocol and its power consumption. The Data Encryption Standard (DES) and Advanced Encryption Standard (AES-128) are used as targets for the attack and are discussed in theory as well as how they are exploited using power characteristics. Finally, we share our attack and how it fairs when attempting to retrieve DES and AES-128 keys as well some insight as to how they can be improved.

  • This report represents the work of one or more WPI undergraduate students submitted to the faculty as evidence of completion of a degree requirement. WPI routinely publishes these reports on its website without editorial or peer review.
Creator
Contributors
Publisher
Identifier
  • E-project-042910-160935
Advisor
Year
  • 2010
Sponsor
Date created
  • 2010-04-29
Resource type
Major
Rights statement

Relations

In Collection:

Items

Items

Permanent link to this page: https://digital.wpi.edu/show/zg64tn24r