Abstract
Simple power analysis (SPA) attacks are characterized by Kocher et al. in [KJJ99] in the following way: “SPA is a technique that involves directly interpreting power consumption measurements collected during cryptographic operations.” In other words, the attacker tries to derive the key more or less directly from a given trace. This can make SPA attacks quite challenging in practice. Often, they require detailed knowledge about the implementation of the cryptographic algorithm that is executed by the device under attack. Furthermore, if only one power trace is available, usually complex statistical methods have to be used in order to extract the signal.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). Simple Power Analysis. In: Power Analysis Attacks. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-38162-6_5
Download citation
DOI: https://doi.org/10.1007/978-0-387-38162-6_5
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-30857-9
Online ISBN: 978-0-387-38162-6
eBook Packages: Computer ScienceComputer Science (R0)
