Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

International Workshop on Cryptographic Hardware and Embedded Systems

CHES 2006: Cryptographic Hardware and Embedded Systems - CHES 2006 pp 174–186Cite as

  1. Home
  2. Cryptographic Hardware and Embedded Systems - CHES 2006
  3. Conference paper
A Proposition for Correlation Power Analysis Enhancement

A Proposition for Correlation Power Analysis Enhancement

  • Thanh-Ha Le18,
  • Jessy Clédière18,
  • Cécile Canovas18,
  • Bruno Robisson18,
  • Christine Servière19 &
  • …
  • Jean-Louis Lacoume19 
  • Conference paper
  • 3344 Accesses

  • 47 Citations

Part of the Lecture Notes in Computer Science book series (LNSC,volume 4249)

Abstract

Cryptographic devices are vulnerable to the nowadays well known side channel leakage analysis. Secret data can be revealed by power analysis attacks such as Simple Power Analysis (SPA), Differential Power Analysis (DPA) and Correlation Power Analysis (CPA). First, we give an overview of DPA in mono-bit and multi-bit cases. Next, the existing multi-bit DPA methods are generalized into the proposed Partitioning Power Analysis (PPA) method. Finally, we focus on the CPA technique, showing that this attack is a case of PPA with special coefficients and a normalization factor. We also propose a method that allows us to improve the performance of CPA by restricting the normalization factor.

Keywords

  • side channel
  • power analysis
  • DPA
  • multi-bit DPA
  • PPA
  • CPA
  • correlation
  • DES
  • AES

Chapter PDF

Download to read the full chapter text

References

  1. Akkar, M.L., Giraud, C.: An Implementation of DES and AES Secure Against Some Attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 309–318. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  2. Akkar, M.L., Goubin, L.: A Generic Protection Against High-Order Differential Power Analysis. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 192–205. Springer, Heidelberg (2003)

    CrossRef  Google Scholar 

  3. Akkar, M.L., Bevan, R., Dischamp, P., Moyart, D.: Power Analysis, What Is Now Possible.... In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 489–502. Springer, Heidelberg (2000)

    CrossRef  Google Scholar 

  4. Bevan, R., Knudsen, E.: Ways to Enhance DPA. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 327–342. Springer, Heidelberg (2003)

    CrossRef  Google Scholar 

  5. Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  6. Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards Sound Approaches to Counteract Power Analysis Attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398–412. Springer, Heidelberg (1999)

    Google Scholar 

  7. Coron, J.S., Goubin, L.: On Boolean and Arithmetic Masking Against Differential Power Analysis. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 231–237. Springer, Heidelberg (2000)

    CrossRef  Google Scholar 

  8. Coron, J.S., Kocher, P., Naccache, D.: Statistics and Secret Leakage. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 157–173. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  9. Goubin, L., Patarin, J.: DES and Differential Power Analysis: The Duplication Method. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 158–172. Springer, Heidelberg (1999)

    CrossRef  Google Scholar 

  10. Kocher, P., Jaffe, J., Jun, B.: Introduction to Differential Power Analysis and related attacks, http://www.cryptography.com

  11. Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)

    Google Scholar 

  12. Mayer-Sommer, R.: Smartly Analysing the Simplicity and the Power of Simple Power Analysis on Smartcards. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 78–92. Springer, Heidelberg (2000)

    CrossRef  Google Scholar 

  13. Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Investigations of Power Analysis Attacks on Smartcards. In: proceedings of the USENIX Workshop on Smart Card Technology (1999), http://www.usenix.org/

  14. Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Transactions on Computers 51(5), 541–552 (2002)

    CrossRef  MathSciNet  Google Scholar 

  15. Canovas, C., Clédière, J.: What do S-boxes Say in Differential Side Channel Attacks? Cryptology ePrint Archive, Report 20085/311 (2005), http://eprint.iacr.org/

  16. Guilley, S., Hoogvorst, P., Pacalet, R.: Differential Power Analysis Model and some Results. In: proceedings of CARDIS 2004, pp. 127–142. Kluwer Academic Publishers, Dordrecht (2004)

    Google Scholar 

  17. Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic Attacks: Concrete Results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 251–261. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  18. Harpes, C.: Partitioning Cryptanalysis. Post-Diploma Thesis, Signal and Information Processing Lab., Swiss Federal Institute of Technology, Zurich (March 1995), http://www.isi.ee.ethz.ch/~harpes/pc.ps

  19. Jakobsen, T.: Correlation Attacks on Block Ciphers, Master’s Thesis, Dept. of Mathematics, Technical University of Denmark (January 1996)

    Google Scholar 

  20. Quisquater, J.J., Samyde, D.: Electromagnetic Analysis (EMA): Measures and Countermeasures for Smart Cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200–201. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  21. Rao, J.R., Rohatgi, P.: EMpowering Side-Channel Attacks. Cryptology ePrint Archive, Report 2001/037 (2001), http://eprint.iacr.org/

  22. Bevan, R.: Estimation statistique et sécurité des cartes à puces, évaluation d’attaques DPA évolués. OCS, rapport de thèse (2004)

    Google Scholar 

  23. Press, W.H., Teukolsky, S.A., Vetterling, W.T., Flannery, B.P.: Numerical Recipes in C++, 2nd edn., p. 1002. Cambridge University Press, New York (2002)

    Google Scholar 

  24. Rao, J.R., Rohatgi, P., Scherzer, H., Tinguely, S.: Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards. In: proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 31–41. IEEE Computer Society, Los Alamitos (2002)

    CrossRef  Google Scholar 

  25. Standaert, F.-X., Mace, F., Peeters, E., Quisquater, J.-J.: Updates on the Security of FPGAs Against Power Analysis Attacks. In: Bertels, K., Cardoso, J.M.P., Vassiliadis, S. (eds.) ARC 2006. LNCS, vol. 3985, pp. 335–346. Springer, Heidelberg (2006)

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. CEA-LETI, 17 avenue des Martyrs, 38 054 Cedex 9, Grenoble, France

    Thanh-Ha Le, Jessy Clédière, Cécile Canovas & Bruno Robisson

  2. Laboratoire des Images et des Signaux, 961 rue de la Houille Blanche, 38 402 Cedex, Saint Martin d’Hères

    Christine Servière & Jean-Louis Lacoume

Authors
  1. Thanh-Ha Le
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Jessy Clédière
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Cécile Canovas
    View author publications

    You can also search for this author in PubMed Google Scholar

  4. Bruno Robisson
    View author publications

    You can also search for this author in PubMed Google Scholar

  5. Christine Servière
    View author publications

    You can also search for this author in PubMed Google Scholar

  6. Jean-Louis Lacoume
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Versailles Saint-Quentin-en-Yvelines University, 45 Avenue des Etats-Unis, 78035, Versailles Cedex, France

    Louis Goubin

  2. Information Technology R&D Center, Mitsubishi Electric Corporation, 5-1-1 Ofuna Kamakura Kanagawa, Japan

    Mitsuru Matsui

Rights and permissions

Reprints and Permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Le, TH., Clédière, J., Canovas, C., Robisson, B., Servière, C., Lacoume, JL. (2006). A Proposition for Correlation Power Analysis Enhancement. In: Goubin, L., Matsui, M. (eds) Cryptographic Hardware and Embedded Systems - CHES 2006. CHES 2006. Lecture Notes in Computer Science, vol 4249. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11894063_14

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/11894063_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-46559-1

  • Online ISBN: 978-3-540-46561-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature