DOI QR코드

DOI QR Code

Implementation of AES and ARIA algorithm with Secure Structure for Power Analysis using LFSR Masking

  • Kang, Young-Jin (Dept. of Ubiquitous IT, Dongseo University) ;
  • Kim, Ki-Hwan (Dept. of Ubiquitous IT, Dongseo University) ;
  • Lee, Hoon Jae (Div. of Information and Communication Engineering, Dongseo University)
  • 투고 : 2019.11.13
  • 심사 : 2019.12.16
  • 발행 : 2020.01.31

초록

본 논문에서는 ARIA 알고리즘과 AES 알고리즘을 대상으로 전력분석공격을 시도한 사례를 찾아 취약점을 분석하고, 이를 통해 전력분석에 안전한 구조를 가지는 알고리즘을 제안하고 실험을 통해 증명하고자 한다. 제안하는 기법은 순환 구조를 가지는 LFSR을 이용하여 마스킹 하는 방식으로 이를 검증하기 위해 Power Trace를 각각 1000개, 2000개, 4000개를 수집한 뒤 전력분석공격을 시도하여 안전한 구조인지를 확인할 수 있는 결과를 보이고자 한다. 실험을 진행하기 위하여 Arduino Uno에 ATmega328 Chip을 사용하여 각 알고리즘을 탑재 하였으며, 소모 전력을 측정하기 위하여 저항을 삽입한 후 진행하였다. 분석결과 제안하는 구조는 전력분석에 안전한 구조를 가지는 것을 증명하였으며, 향후 성능고도화까지 이끌어 낼 수 있는 방법을 연구하고자 한다.

In this paper, we analyzed the case vulnerable to the power analysis attack of the ARIA algorithm and AES algorithm. Through this, we propose an algorithm with a safe structure for power analysis and prove through experiment. The proposed technique is a masking method using LFSR with a cyclic structure. To verify this, 1000, 2000, and 4000 power traces were collected, and the corresponding results are shown and proved. We used ATmega328 Chip for Arduino Uno for the experiment and mounted each algorithm. In order to measure the power consumption, a resistor was inserted and then proceeded. The analysis results show that the proposed structure has a safe structure for power analysis. In the future, we will study ways to lead to performance enhancement.

키워드

참고문헌

  1. Kwon, Daesung, et al. "New block cipher: ARIA", International Conference on Information Security and Cryptology, LNCS, volume 2971, pp. 432-445, Berlin, Heidelberg, 2003.
  2. AES cryptographic algorithm, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
  3. Paul C. Kocher, Joshua Jaffe, and Benjamin Jun, "Differential Power Analysis", In Michael Wiener, editor, Advances in Cryptology - CRYPTO '99, volume 1666 of Lecture Notes in Computer Science, pages 388-397. Springer, December, 1999.
  4. L. Goubin, J. Paratin, "DES and differential power analysis The "Duplication" Method", CHES'99, LNCS 1717, pp.158-172, February, 1999.
  5. JungKab Seo, ChangKyun Kim, JaeCheol Ha, SangJae Moon, IlHwan Park, "Differential Power Analysis Attack of Block Cipher ARIA", Journal of The Korea Institute of Information Security & Cryptology, Vol.15 No.l, pp. 99-106, 2005.
  6. Park, Jae Hoon, HoonJae Lee, and ManKi Ahn. "Side-channel attacks against aria on active rfid device." 2007 International Conference on Convergence Information Technology (ICCIT 2007). IEEE, pp. 2163-2168, November, 2007.
  7. Kim, ChangKyun, Martin Schläffer, and SangJae Moon. "Differential side channel analysis attacks on FPGA implementations of ARIA." ETRI journal vol. 30, no.2, pp. 315-325, April, 2008. https://doi.org/10.4218/etrij.08.0107.0167
  8. Young Jin Kang et al., "An Experimental CPA Attack for Arduino Cryptographic Module and Analysis in Software-based CPA Countermeasures", International Journal of Security and Its Applications, Vol. 8, No.2, pp. 261-270, Apr. 2014. https://doi.org/10.14257/ijsia.2014.8.2.27
  9. Zhang, Xiaoyu, et al. "Correlation power analysis for AES encryption device." 2015 4th National Conference on Electrical, Electronics and Computer Engineering, Atlantis Press, pp. 1003-1009, December, 2015.
  10. Lo, Owen, William J. Buchanan, and Douglas Carson. "Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA).", Journal of Cyber Security Technology, 1(2):88-107, 2017. https://doi.org/10.1080/23742917.2016.1231523
  11. Young-Jin Kang, Ki-Hwan Kim, and HoonJae Lee. "Scrambler Based AES for Countermeasure Against Power Analysis Attacks." Advanced Multimedia and Ubiquitous Engineering. Springer, Singapore, pp. 152-157, April, 2019.