Abstract
Differential power analysis (DPA) is a strong attack upon cryptographic devices such as smartcards. Correlation power analysis (CPA) is a specific form of DPA where the Hamming-weight and the correlation coefficient are employed. In this paper we investigate the intrinsic vulnerability of the individual operations that are targeted in DPA attacks. We find that under the typical circumstances, there is a difference in resistance to the attack between the operations. We then provide a precise definition of CPA resistance and capture it in a simple yet effective metric to rank operations. The metric is validated with both simulations and experiments on actual hardware.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
M.-L. Akkar, R. Bevan, P. Dischamp, and D. Moyart. Power analysis, what is now possible... In ASIACRYPT, pages 489–502. Springer, 2000.
R. Bevan and E. Knudsen. Ways to enhance differential power analysis. In ICISC, pages 327–342. Springer, 2002.
E. Brier, C. Clavier, and F. Olivier. Correlation power analysis with a leakage model. In CHES, pages 16–29. Springer, 2004.
J. Daemen and V. Rijmen. The Design of Rijndael. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2002.
D. Gligoroski. Stream cipher based on quasigroup string transformations in Z*p. Computing Research Repository (CoRR), cs.CR/0403043, 2004.
S. Guilley, P. Hoogvorst, and R. Pacalet. Differential power analysis model and some results. In CARDIS, pages 127–142. Kluwer, 2004.
P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In CRYPTO, pages 388–397. Springer, 1999.
T.-H. Le, J. Clediere, C. Serviere, and J.-L. Lacoume. A proposition for correlation power analysis enhancement. In CHES, pages 174–186. Springer, 2006.
T.-H. Le, J. Clediere, C. Serviere, and J.-L. Lacoume. How can signal processing benefit side channel attacks? IEEE Workshop on Signal Processing Applications for Public Security and Forensics, pages 1–7, April 2007.
K. Lemke, K. Schramm, and C. Paar. DPA on n-bit sized boolean and arithmetic operations and its application to IDEA, RC6, and the HMAC-construction. In M. Joye and J-J. Quisquater, editors, CHES, pages 205–219. Springer, 2004.
S. Mangard, E. Oswald, and T. Popp. Power Analysis Attacks: Revealing the Secrets of Smart Cards. Advances in Information Security. Springer, 2007.
T. Messerges, E. Dabbish, and R. Sloan. Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Computers, 51(5):541–552, 2002.
E. Prouff. DPA attacks and S-boxes. In FSE, pages 424–441. Springer, 2005.
A. Siegel. Statistics and data analysis: an introduction. John Wiley & Sons,, 1988.
F.-X. Standaert, E. Peeters, C. Archambeau, and J.-J. Quisquater. Towards security limits in side-channel attacks. In CHES, pages 30–45. Springer, 2006.
D. Wheeler and R. Needham. TEA, a tiny encryption algorithm. In FSE, pages 363–366. Springer, 1994.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 IFIP International Federation for Information Processing
About this paper
Cite this paper
Pan, J., Hartog, J.d., Vink, E.d. (2008). An Operation-Based Metric for CPA Resistance. In: Jajodia, S., Samarati, P., Cimato, S. (eds) Proceedings of The Ifip Tc 11 23rd International Information Security Conference. SEC 2008. IFIP – The International Federation for Information Processing, vol 278. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09699-5_28
Download citation
DOI: https://doi.org/10.1007/978-0-387-09699-5_28
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-09698-8
Online ISBN: 978-0-387-09699-5
eBook Packages: Computer ScienceComputer Science (R0)