Techniques to Enhance the Resistance of Precharged Busses to Differential Power Analysis

  • M. Alioto
  • M. Poli
  • S. Rocchi
  • V. Vignoli
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4148)


In this communication, different techniques to improve the resistance to Differential Power Analysis (DPA) attacks of precharged busses are discussed. These statistical attacks rely on the observation of the power consumption, and are very effective in recovering confidential information that are stored or processed in SmartCards running cryptographic algorithms. Accordingly, a few techniques to improve the information security by reducing the effectiveness of DPA attacks are discussed. These techniques are statistically analyzed and compared in terms of DPA resistance, power and area overhead. Finally, these techniques are mixed to improve the robustness to DPA attacks. Cycle-accurate simulations on DES encryption algorithm running on a MIPS32® architecture are used to validate the discussed techniques.


Power Consumption Balance Line Information Leakage Area Overhead Mixed Approach 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)MATHGoogle Scholar
  2. 2.
    Rankl, W., Effing, W.: SmartCard Handbook. John Wiley & Sons, Chichester (1999)Google Scholar
  3. 3.
    Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Trans. on Computers 51(5), 541–552 (2002)CrossRefMathSciNetGoogle Scholar
  4. 4.
    Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)Google Scholar
  5. 5.
    Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)Google Scholar
  6. 6.
    Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Investigations of power analysis attacks on SmartCards. In: Proc. of USENIX Workshop on Smartcard Technology, Chicago, USA (1999)Google Scholar
  7. 7.
    Papoulis, A.: Probability, Random Variables, and Stochastic Processes. McGraw-Hill, New York (1965)MATHGoogle Scholar
  8. 8.
    Rabaey, J., Chandrakasan, A., Nikolic, B.: Digital Integrated Circuits (A Design Perspective). Prentice-Hall, Englewood Cliffs (2003)Google Scholar
  9. 9.
    Lin, R.B., Tsai, C.M.: Theoretical analysis of bus-invert coding. IEEE Trans. on VLSI Systems 10(6), 929–935 (2002)CrossRefGoogle Scholar
  10. 10.
    Stan, M.R., Burleson, W.P.: Bus-invert coding for low-power I/O. IEEE Trans. on VLSI Systems 3(1), 49–58 (1995)CrossRefGoogle Scholar
  11. 11.
    Stan, M.R., Burleson, W.P.: Low-power encodings for global communication in CMOS VLSI. IEEE Trans. on VLSI Systems 5(4), 444–455 (1997)CrossRefGoogle Scholar
  12. 12.
    MIPS Technologies Inc.,
  13. 13.
    Federal Information Processing Standards Publication (FIPS PUB) 46-3,
  14. 14.
    National Institute of Standards and Technology (NIST) Special Publication 800-17,

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • M. Alioto
    • 1
  • M. Poli
    • 1
  • S. Rocchi
    • 1
  • V. Vignoli
    • 1
  1. 1.DIIUniversità di SienaSIENAItaly

Personalised recommendations