Autors: Vladimirov, I. H., Nikolova, D. V., Terneva, Z. A.
Title: Hardware Implementation and Comparison of CRA and TRA when Trying to Recover the AES-128 Key
Keywords: Side-channel attacks – Correlation Radio Attack, Template Ra

Abstract: In this scientific paper, a comparison of two side-channel radio attacks is made: CRA – Correlation Radio Attack and TRA – Template Radio Attack. Both attacks are tested on mixed-signal chips that include both the radio transceiver and the digital logic on the same integrated circuit. In systems like this, the analog transmitter unintentionally leaks sensitive data, related to the cryptographic hardware components and the software being run on the CPU, by broadcasting it on a shifted frequency. The basic conception is that information from the electromagnetic leakage is gathered and then exploited by analyzing it via the side-channel attacks in order to crack the AES-128 algorithm. The system needed for the experiment consists of: a PCA10040 chip by Nordic Semiconductor, a USRP n210 by СР-Ettus Research and a Linux-based computer.

References

  1. Camurati, G. Poeplau, S. Muench, M. Hayes, T. Francillon, A., 2018, Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers, Toronto, Canada, 15-19 October 2018, <New York>, Association for Computing Machinery
  2. Afzali-Kusha, A. Nagata, M. Verghese N. Allstot, D.J., 2006, Substrate Noise Coupling in SoC Design: Modeling, Avoidance, and Validation, Proceedings of the IEEE, Volume 94(12), pp. pp.2109-2138
  3. Hibbert, I. Itronix, Inc. 2006 bluetooth.4 — Bluetooth Protocol Family
  4. Bernstein, D.J., 2005, Cache-Timing Attacks on AES, e-book, Chicago, , <https://cr.yp.to/antiforgery/cachetiming-20050414.pdf>, Дата на последен преглед (Last accessed on): 09.09.2022
  5. Rai, V.K. Reddy, B.V. Tripathy, S. Mathew, J., 2019, Correlation power analysis and effective defense approach on light encryption device block cipher, Security and Privacy, Volume 2(5), pp. pp. e87
  6. El Aabid, M.A. Guilley, A. Hoogvorst, P., 2007, Template Attacks with a Power Model, e-book, , Cryptology ePrint Archive, <https://eprint.iacr.org/2007/443.pdf>, Дата на последен преглед (Last accessed on): 09.09.2022
  7. Bronckers, S., 2009, SUBSTRATE NOISE COUPLING IN ANALOG/RF SYSTEMS, Ph.D, <Vrije Universiteit Brussel>
  8. Li, H. Markettos, A.T. Moore, S., 2005, Security evaluation against electromagnetic analysis at design time, Napa Valley, 30 November - 2 December 2005, <USA>, IEEE
  9. Nikolova, D. Vladimirov, I. Terneva, Z., 2020, Software implementation of CRA and TRA to recover the AES-128 key using side-channel signals with Python3, Nis, 10-12 September 2020, <Nis>, IEEE

Issue

ICEST Conference, issue 55, pp. 256 - 258, 2020, Serbia, ISBN 978-172817143-2

Copyright International Scientific Conference on Information, Communication and Energy Systems and Technologies

Full text of the publication

Вид: постер/презентация в международен форум, публикация в реферирано издание, индексирана в Scopus