Paper 2014/899

Side Channel Power Analysis of an AES-256 Bootloader

Colin O'Flynn and Zhizhang Chen

Abstract

Side Channel Attacks (SCA) using power measurements are a known method of breaking cryptographic algorithms such as AES. Published research into attacks on AES frequently target only AES-128, and often target only the core Electronic Code-Book (ECB) algorithm, without discussing surrounding issues such as triggering, along with breaking the initialization vector. This paper demonstrates a complete attack on a secure bootloader, where the firmware files have been encrypted with AES-256-CBC. A classic Correlation Power Analysis (CPA) attack is performed on AES-256 to recover the complete 32-byte key, and a CPA attack is also used to attempt recovery of the initialization vector (IV).

Note: Revised to reflect final published version, add copyright notice

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. CCECE 2015 - IEEE Canadian Conference on Electrical and Computer Engineering
Keywords
side channelpower analysisAES256
Contact author(s)
coflynn @ newae com
History
2015-03-19: last of 2 revisions
2014-10-30: received
See all versions
Short URL
https://ia.cr/2014/899
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/899,
      author = {Colin O'Flynn and Zhizhang Chen},
      title = {Side Channel Power Analysis of an AES-256 Bootloader},
      howpublished = {Cryptology ePrint Archive, Paper 2014/899},
      year = {2014},
      note = {\url{https://eprint.iacr.org/2014/899}},
      url = {https://eprint.iacr.org/2014/899}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.