As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com.

Changes

Jump to: navigation, search

Tutorial CW305-2 Breaking AES on FPGA

1,804 bytes added, 20:12, 16 January 2017
no edit summary
= Theoretical Background =
- Hardware During this tutorial, we'll be working with a hardware AES- Operations done implementation. This type of attack can be much more difficult than a software AES attack. In the software AES attacks, we needed hundreds or thousands of clock cycles to capture the algorithm's full execution. In contrast, a hardware AES implementation may have a variety of speeds. Depending on the performance of the hardware, a whole spectrum of execution speeds can be achieved by executing many operations in a single clock cycle. It is theoretically possible to execute the entire AES encryption in a single cycle, given enough hardware space and provided that the clock is not too fast. Most hardware accelerators are designed to complete one round or one large part of a round in a single cycle.  This fast execution may cause problems with a regular CPA attack. In software, we found that it was easy to search for the outputs of the s-boxes because these values would need to be loaded from memory onto a high- Spectrum capacitance data bus. This is not necessarily true on an FPGA, where the output of speed vs sizethe s- Difficulty boxes may be directly fed into the next stage of finding leakage (HW vs HD)the algorithm. In general, we may need some more knowledge of the hardware implementation to successfully complete an attack. In our case, let's suppose that every round of AES is completed in a single clock cycle. Recall the execution of AES: [[File:AES_Encryption.png]] Here, every blue block is executed in one clock cycle. This means that an excellent candidate for a CPA attack is the difference between the input and output of the final round. It is likely that this state is stored in a port that is updated every round, so we expect that the Hamming distance between the round input and output is the most important factor on the power consumption. Also, the last round is the easiest to attack because it has no MixColumns operation. We'll use this Hamming distance as the target in our CPA attack.
= Capture Setup =
Approved_users
510
edits

Navigation menu