Enter your keyword

2-s2.0-85076379172

[vc_empty_space][vc_empty_space]

Attack on AES Encryption Microcontroller Devices with Correlation Power Analysis

Nuradha F.R.a, Putra S.D.b, Kurniawan Y.a, Rizqulloh M.A.a

a Microelectronics Engineering, School of Electrical Enginering and Informatics, Institut Teknologi Bandung, Bandung, Indonesia
b Management of Informatics Study Program and Informatics, Politeknik Negeri Lampung, Bandar Lampung, Indonesia

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2019 IEEE.Encryption is a technology that works by scrambling data so that it cannot be read by unwanted parties. The Advanced Encryption Standard (AES), also known as Rijndael, is a specification for electronic data encryption The tool used in the implementation of AES is ATmega328p. ATmega328P is an 8-bit AVR CMOS based microcontroller with RISC architecture. Correlation Power Analysis (CPA) is an attack that allows us to find the secret encryption key stored on a hardware device. Notduino is a device that is used as a target for the ChipWisperer Capture system. With this notduino, the writer can do attack activities to get the AES key used on the microcontroller. The researcher used the CW1173 board to retrieve the trace when the AES program worked. With CPA analysis with the Hamming distance S-box output method the researcher managed to find all the subkey keys used in the AES encryption algorithm. With the results obtained, it shows that higher security is needed for AES encryption so that it is not easy to attack.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Advanced Encryption Standard,Atmega328p,Correlation power analysis,Correlation power analysis (CPA),CW1173,Microcontroller devices,Notduino,subkey[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]AES,Atmega328p,CPA,CW1173,encryption,Notduino,subkey[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ISESD.2019.8909447[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]