Advertisement

Differential Power Analysis: Attacks and Resisting Techniques

  • Hridoy Jyoti Mahanta
  • Abul Kalam Azad
  • Ajoy Kumar Khan
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 340)

Abstract

Differential Power Analysis (DPA) is a statistical approach to analyze the power consumption of a cryptographic system to break its security infrastructure. It has challenged the vulnerability of most of the cryptographic techniques like DES, AES, RSA etc. With DPA, attackers passively collect the power traces of the system and then make a comparative analysis with some hypothetical power traces. The analysis result having high value reveals the secret key used. This kind of attack has been explored by many researchers and has proposed techniques to make such attacks highly efficient. In this paper we present a detail on DPA along with the models and types for such attack. We also present some of the recent attack techniques as well as countermeasures on DPA.

Keywords

Power analysis DPA SPA Hamming weight model Hamming distance model AES 

References

  1. 1.
    Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology—CRYPTO ’99. Springer, Berlin, pp. 388–397 (1999)Google Scholar
  2. 2.
    Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards, vol. 31. Springer, Berlin (2008)MATHGoogle Scholar
  3. 3.
    Ors, S.B., Gurkaynak, F., Oswald, E., Preneel, B.: Power-analysis attack on an ASIC AES implementation. In: Information Technology: Coding and Computing, ITCC 2004, vol. 2, pp. 546–552 (2004)Google Scholar
  4. 4.
    Krieg, A., Bachmann, C., Grinschgl, J., Steger, C., Weiss, R., Haid, J.: Accelerating early design phase differential power analysis using power emulation techniques. In: IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2011, pp. 81–86 (2011)Google Scholar
  5. 5.
    Sun, S., Yan, Z., Zambreno, J.: Experiments in attacking FPGA-based embedded systems using differential power analysis. In: IEEE International Conference on Electro/Information Technology, EIT 2008, pp. 7–12 (2008)Google Scholar
  6. 6.
    Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Advances in Cryptology—CRYPTO ’99. Springer, Berlin, pp. 398–412 (1999)Google Scholar
  7. 7.
    Waddle, J., Wagner, D.: Towards efficient second-order power analysis. In: Cryptographic Hardware and Embedded Systems—CHES. Springer, Berlin, pp. 1–15 (2004)Google Scholar
  8. 8.
    Joye, M., Paillier, P., Schoenmakers, B.: On second-order differential power analysis. In: Cryptographic Hardware and Embedded Systems—CHES. Springer, Berlin, pp. 293–308 (2005)Google Scholar
  9. 9.
    Messerges, T.S.: Using second-order power analysis to attack DPA resistant software. In: Cryptographic Hardware and Embedded Systems—CHES. Springer, Berlin, pp. 238–251 (2000)Google Scholar
  10. 10.
    Gierlichs, B., Batina, L., Preneel, B., Verbauwhede, I.: Revisiting higher-order DPA attacks. In: Topics in Cryptology—CT-RSA. Springer, Berlin, pp. 221–234 (2010)Google Scholar
  11. 11.
    Jaffe, J.: A first-order DPA attack against AES in counter mode with unknown initial counter, pp. 1–13. Springer, Berlin (2007)MATHGoogle Scholar
  12. 12.
    Kamoun, N.M., Bossuet, L., Ghazel, A.: Experimental implementation of 2ODPA attacks on AES design with flash-based FPGA technology. In: IEEE International Conference on Microelectronics, ICM 2010, pp. 407–410 (2010)Google Scholar
  13. 13.
    Tang, M., Qiu, Z., Gao, S., Yi, M., Liu, S., Zhang, H., Jin, Y.: Polar differential power attacks and evaluation. Sci. China Inf. Sci. 55(7), 1588–1604 (2012)MathSciNetCrossRefMATHGoogle Scholar
  14. 14.
    Canright, D.: A very compact S-box for AES. In: Cryptographic Hardware and Embedded Systems—CHES. Springer, Berlin, pp. 44–455 (2005)Google Scholar
  15. 15.
    Mangard, S., Pramstaller, N., Oswald, E.: Successfully attacking masked AES hardware implementations. In: Cryptographic Hardware and Embedded Systems—CHES. Springer, Berlin, pp. 157–171 (2005)Google Scholar
  16. 16.
    Ratanpal, G.B., Williams, R.D., Blalock, T.N.: An on-chip signal suppression countermeasure to power analysis attacks. IEEE Trans. Dependable Secure Comput. 1(3), 179–189 (2004)CrossRefGoogle Scholar
  17. 17.
    Baddam, K., Zwolinski, M.: Evaluation of dynamic voltage and frequency scaling as a differential power analysis countermeasure. In: 20th International Conference on VLSI Design, 2007. Held Jointly with 6th International Conference on Embedded Systems, pp. 854–862. IEEE (2007)Google Scholar
  18. 18.
    Lu, Y., O’Neill, M.P., McCanny, J.V.: FPGA implementation and analysis of random delay insertion countermeasure against DPA. In: International Conference on ICECE Technology, 2008. FPT 2008, pp. 201–208. IEEE (2008)Google Scholar
  19. 19.
    Prouff, E., Giraud, C., Aumonier, S.: Provably secure S-box implementation based on fourier transform. In: Cryptographic Hardware and Embedded Systems—CHES. Springer, Berlin, pp. 216–230 (2006)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  • Hridoy Jyoti Mahanta
    • 1
  • Abul Kalam Azad
    • 1
  • Ajoy Kumar Khan
    • 1
  1. 1.Department of Information TechnologyAssam UniversitySilcharIndia

Personalised recommendations