A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Side channel power analysis of an AES-256 bootloader
2015
2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering (CCECE)
Side Channel Attacks (SCA) using power measurements are a known method of breaking cryptographic algorithms such as AES. Published research into attacks on AES frequently target only AES-128, and often target only the core Electronic Code-Book (ECB) algorithm, without discussing surrounding issues such as triggering, along with breaking the initialization vector. This paper demonstrates a complete attack on a secure bootloader, where the firmware files have been encrypted with AES-256-CBC. A
doi:10.1109/ccece.2015.7129369
dblp:conf/ccece/OFlynnC15
fatcat:3lts2otz6zgmhia7fbrztzp24i