A Proposition for Correlation Power Analysis Enhancement

  • Thanh-Ha Le
  • Jessy Clédière
  • Cécile Canovas
  • Bruno Robisson
  • Christine Servière
  • Jean-Louis Lacoume
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4249)

Abstract

Cryptographic devices are vulnerable to the nowadays well known side channel leakage analysis. Secret data can be revealed by power analysis attacks such as Simple Power Analysis (SPA), Differential Power Analysis (DPA) and Correlation Power Analysis (CPA). First, we give an overview of DPA in mono-bit and multi-bit cases. Next, the existing multi-bit DPA methods are generalized into the proposed Partitioning Power Analysis (PPA) method. Finally, we focus on the CPA technique, showing that this attack is a case of PPA with special coefficients and a normalization factor. We also propose a method that allows us to improve the performance of CPA by restricting the normalization factor.

Keywords

side channel power analysis DPA multi-bit DPA PPA CPA correlation DES AES 

References

  1. 1.
    Akkar, M.L., Giraud, C.: An Implementation of DES and AES Secure Against Some Attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 309–318. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  2. 2.
    Akkar, M.L., Goubin, L.: A Generic Protection Against High-Order Differential Power Analysis. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 192–205. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  3. 3.
    Akkar, M.L., Bevan, R., Dischamp, P., Moyart, D.: Power Analysis, What Is Now Possible.... In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 489–502. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  4. 4.
    Bevan, R., Knudsen, E.: Ways to Enhance DPA. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 327–342. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  5. 5.
    Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  6. 6.
    Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards Sound Approaches to Counteract Power Analysis Attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398–412. Springer, Heidelberg (1999)Google Scholar
  7. 7.
    Coron, J.S., Goubin, L.: On Boolean and Arithmetic Masking Against Differential Power Analysis. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 231–237. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  8. 8.
    Coron, J.S., Kocher, P., Naccache, D.: Statistics and Secret Leakage. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 157–173. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  9. 9.
    Goubin, L., Patarin, J.: DES and Differential Power Analysis: The Duplication Method. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 158–172. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  10. 10.
    Kocher, P., Jaffe, J., Jun, B.: Introduction to Differential Power Analysis and related attacks, http://www.cryptography.com
  11. 11.
    Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)Google Scholar
  12. 12.
    Mayer-Sommer, R.: Smartly Analysing the Simplicity and the Power of Simple Power Analysis on Smartcards. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 78–92. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  13. 13.
    Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Investigations of Power Analysis Attacks on Smartcards. In: proceedings of the USENIX Workshop on Smart Card Technology (1999), http://www.usenix.org/
  14. 14.
    Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Transactions on Computers 51(5), 541–552 (2002)CrossRefMathSciNetGoogle Scholar
  15. 15.
    Canovas, C., Clédière, J.: What do S-boxes Say in Differential Side Channel Attacks? Cryptology ePrint Archive, Report 20085/311 (2005), http://eprint.iacr.org/
  16. 16.
    Guilley, S., Hoogvorst, P., Pacalet, R.: Differential Power Analysis Model and some Results. In: proceedings of CARDIS 2004, pp. 127–142. Kluwer Academic Publishers, Dordrecht (2004)Google Scholar
  17. 17.
    Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic Attacks: Concrete Results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 251–261. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  18. 18.
    Harpes, C.: Partitioning Cryptanalysis. Post-Diploma Thesis, Signal and Information Processing Lab., Swiss Federal Institute of Technology, Zurich (March 1995), http://www.isi.ee.ethz.ch/~harpes/pc.ps
  19. 19.
    Jakobsen, T.: Correlation Attacks on Block Ciphers, Master’s Thesis, Dept. of Mathematics, Technical University of Denmark (January 1996)Google Scholar
  20. 20.
    Quisquater, J.J., Samyde, D.: Electromagnetic Analysis (EMA): Measures and Countermeasures for Smart Cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200–201. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  21. 21.
    Rao, J.R., Rohatgi, P.: EMpowering Side-Channel Attacks. Cryptology ePrint Archive, Report 2001/037 (2001), http://eprint.iacr.org/
  22. 22.
    Bevan, R.: Estimation statistique et sécurité des cartes à puces, évaluation d’attaques DPA évolués. OCS, rapport de thèse (2004)Google Scholar
  23. 23.
    Press, W.H., Teukolsky, S.A., Vetterling, W.T., Flannery, B.P.: Numerical Recipes in C++, 2nd edn., p. 1002. Cambridge University Press, New York (2002)Google Scholar
  24. 24.
    Rao, J.R., Rohatgi, P., Scherzer, H., Tinguely, S.: Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards. In: proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 31–41. IEEE Computer Society, Los Alamitos (2002)CrossRefGoogle Scholar
  25. 25.
    Standaert, F.-X., Mace, F., Peeters, E., Quisquater, J.-J.: Updates on the Security of FPGAs Against Power Analysis Attacks. In: Bertels, K., Cardoso, J.M.P., Vassiliadis, S. (eds.) ARC 2006. LNCS, vol. 3985, pp. 335–346. Springer, Heidelberg (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Thanh-Ha Le
    • 1
  • Jessy Clédière
    • 1
  • Cécile Canovas
    • 1
  • Bruno Robisson
    • 1
  • Christine Servière
    • 2
  • Jean-Louis Lacoume
    • 2
  1. 1.CEA-LETIGrenobleFrance
  2. 2.Laboratoire des Images et des SignauxSaint Martin d’Hères

Personalised recommendations