DES and Differential Power Analysis The “Duplication” Method
Paul Kocher recently developped attacks based on the electric consumption of chips that perform cryptographic computations. Among those attacks, the “Differential Power Analysis” (DPA) is probably one of the most impressive and most difficult to avoid.
KeywordsElectric Consumption Cryptographic Algorithm Fundamental Hypothesis Consumption Curve Simple Power Analysis
- 1.Paul Kocher, Joshua Jaffe, Benjamin Jun, Introduction to Differential Power Analysis and Related Attacks, 1998. This paper is available at http://www.cryptography.com/dpa/technical/index.html