Advertisement

Differential Power Analysis in the Presence of Hardware Countermeasures

  • Christophe Clavier
  • Jean-Sébastien Coron
  • Nora Dabbous
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1965)

Abstract

The silicon industry has lately been focusing on side channel attacks, that is attacks that exploit information that leaks from the physical devices. Although different countermeasures to thwart these at- tacks have been proposed and implemented in general, such protections do not make attacks infeasible, but increase the attacker’s experimental (data acquisition) and computational (data processing) workload beyond reasonable limits. This paper examines different ways to attack devices featuring random process interrupts and noisy power consumption.

Keywords

Power analysis smart card hardware countermeasure random process interrupt 

References

  1. 1.
    R. Anderson, M. Kuhn, Tamper resistance-a cautionary note, The second usenix workshop on electronic commerce, pp. 1–11, 1996.Google Scholar
  2. 2.
    S. Chari, C. S. Jutla, J. R. Rao, P. Rohatgi, Towards Sound Approaches to Counteract Power-Analysis Attacks, Springer-Verlag, LNCS 1666, pp. 398–411, Crypto’99, 1999.Google Scholar
  3. 3.
    J.-S Coron, Resistance against Differential Power Analysis for Elliptic Curve Crytosystems, Springer-Verlag, LNCS 1717, pp. 292–302, CHES’99, 1999.Google Scholar
  4. 4.
    J.-S. Coron, P. Kocher, D. Naccache, Statistics and Secret Leakage, FC’00, to appear in the LNCS series, 2000.Google Scholar
  5. 5.
    P. N. Fahn, P. K. Pearson, IPA: A New Class of Power Attacks, Springer-Verlag, LNCS 1717, pp. 173–186, CHES’99, 1999.Google Scholar
  6. 6.
    L. Goubin, J. Patarin, DES and Differential Power Analysis, Springer-Verlag, LNCS 1717, pp. 158–172, CHES’99, 1999.Google Scholar
  7. 7.
    P. Kocher Differential Power Analysis, Springer-Verlag, LNCS 1666, pp. 388–397, Crypto’99, 1999.Google Scholar
  8. 8.
    P. Kocher Timing Attacks on Implementation of Diffe-Hellman, RSA, DSS, and Other Systems, Springer-Verlag, LNCS 1109, pp. 104–113, Crypto’96, 1996.Google Scholar
  9. 9.
    R. G. Lyons, Understanding Digital Signal Processing, Addison Wesley Longman, pp. 327–330, 1997.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • Christophe Clavier
    • 1
  • Jean-Sébastien Coron
    • 1
  • Nora Dabbous
    • 2
  1. 1.Gemplus Card InternationalGemenosFrance
  2. 2.Gemplus Card InternationalFrance

Personalised recommendations