Attacking AES-Masking Encryption Device with Correlation Power Analysis
Main Article Content
Abstract
Modern communication system use cryptography algorithm to ensure data still confidentiality, integrity, and authentic. There is a new vulnerability in a cryptographic algorithm when implemented on a hardware device. This vulnerability is considered capable of uncovering a secret key used in a cryptographic algorithm. This technique is known as a power analysis attack. Previous and other research introduces countermeasure to countering this new vulnerability. Some researchers suggest using logic level with encoding the AES. The countermeasure using logic is meager cost and efficient. The contribution of this paper is to analyze CPA on encryption device that has been given logic level countermeasure. Our finding of this paper is the use of encoding with one-hot masking technique does not provide the maximum countermeasure effect against CPA-based attacks. In this research, CPA attack can be successfully revealing the AES secret-key
Article Details
How to Cite
Putra, S. D., Ahmad, A. S., Sutikno, S., & Kurniawan, Y. (2022). Attacking AES-Masking Encryption Device with Correlation Power Analysis. International Journal of Communication Networks and Information Security (IJCNIS), 10(2). https://doi.org/10.17762/ijcnis.v10i2.2884 (Original work published August 8, 2018)
Issue
Section
Research Articles