Abstract
Techniques such as DPA and SPA can be used to find the secret keys stored in smart-cards. These techniques have caused concern for they can allow people to recharge their stored value smartcards (in effect printing money), or illegally use phone or digital TV services. We propose an addition to current processors which will counteract these techniques. By randomising register usage, we can hide the secret key stored in a smartcard. The extension we propose can be added to existing processors, and is transparent to the algorithm.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
S. Chari, C.S. Jutla, J.R. Rao and P. Rohatgi. Towards sound approaches to counteract power-analysis attacks. Advances in Cryptology, CRYPTO’ 99, Springer LNCS 1666, 398–412, 1999.
S. Chari, C.S. Jutla, J.R. Rao and P. Rohatgi. A cautionary note regarding evaluation of AES candidates on Smart-Cards. Second Advanced Encryption Standard Candidate Conference, Rome March 1999.
L. Goubin and J. Patarin. DES and differential power analysis. The “duplication method”. Cryptographic Hardware and Embedded Systems, Springer LNCS 1717, 158–172, 1999.
J.L. Hennessy and D.A. Patterson. Computer architecture: a quantitative approach. Morgan Kaufmann Publishers, Palo Alto, California, 1990.
N. P. Jouppi and D. W. Wall. Available instruction-level parallelism for superscalar and super-pipelined machines. ASPLOS-III, 272–282, 1989.
P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems. Advances in Cryptology, CRYPTO’ 96, Springer LNCS 1109, 104–113, 1996.
P. Kocher, J. Jaffe and B. Jun. Differential Power Analysis. Advances in Cryptology, CRYPTO’ 99, Springer LNCS 1666, 388–397, 1999.
O. Kömmerling and M. Kuhn. Design Principles for Tamper-Resistant Smartcard Processors. USENIX Workshop on Smartcard Technology, Chicago, Illinois, USA, May 10-11, 1999.
D. May, H. Muller and N.P. Smart Non-Deterministic Processors To appear ACISP 2001, Springer Verlag, LNCS, July 2001.
D Sima, T Foutain and P Kacsuk. Advanced Computer Architectures. Addison Wesley, 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
May, D., Muller, H.L., Smart, N.P. (2001). Random Register Renaming to Foil DPA. In: Koç, Ç.K., Naccache, D., Paar, C. (eds) Cryptographic Hardware and Embedded Systems — CHES 2001. CHES 2001. Lecture Notes in Computer Science, vol 2162. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44709-1_4
Download citation
DOI: https://doi.org/10.1007/3-540-44709-1_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42521-2
Online ISBN: 978-3-540-44709-2
eBook Packages: Springer Book Archive