Skip to main content

Ways to Enhance Differential Power Analysis

  • Conference paper
  • First Online:
Information Security and Cryptology — ICISC 2002 (ICISC 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2587))

Included in the following conference series:

Abstract

In [1] P. Kocher et al. introduced Differential Power Analysis (DPA), a statistical test (the difference of means) to retrieve secret keys from smart cards power consumption. For the correct hypothesis on the key, the difference of means is significantly different from zero. Hence a large peak is observed in the trace of the difference of means for the correct hypothesis. In the first part of this paper we explain why even with an arbitrarily large number of experiments, the difference of means is not always null for incorrect hypotheses on the key. We show further that peaks observed in the traces of the difference of means for incorrect hypotheses are inherent to the attacked algorithm and that this knowledge can be used to enhance power analysis attacks. Finally we propose another test that under some conditions efficiently detects the correct hypothesis even if incorrect hypotheses show larger peaks on the curves representing the difference of means. The combination of these methods can reduce the number of messages necessary to retrieve a key from a device by a factor greater than 2.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kocher P., Jaffe J., Jun B., “Differential power analysis”, Advances in Cryptology-Proceedings of CRYPTO’99 327

    Google Scholar 

  2. Chari S., Jutla CS., Rao JR., Rohatgi P.,“Towards sound approaches to counteract power analysis attacks”, Advances in Cryptology-Proceedings of CRYPTO’99 327, 328, 340

    Google Scholar 

  3. Messerges TS., “Using second-order power analysis to attack DPA resistant software”, Cryptographic Hardware and Embedded Systems-Proceedings of CHES 2000 327

    Google Scholar 

  4. Messerges TS., Dabbish EA., Sloan RH., “Investigations of power analysis attacks on smart cards”, Proceedings of the USENIX Workshop on Smart Card Technology 1999

    Google Scholar 

  5. Messerges TS., Dabbish EA., Sloan RH., “Examining Smart-Card Security under the Threat of Power Analysis Attacks”, IEEE Transactions on computers, Vol. 51, No. 5, May 2002 328, 337

    Google Scholar 

  6. Coron JS., Kocher P., Naccache D., “Statistics and secret leakage”, Proceedings of Financial Cryptography 2000 328, 336

    Google Scholar 

  7. Clavier C., Coron JS., Dabbous N., “Differential power analysis in the presence of hardware countermeasures”, Cryptographic Hardware and Embedded Systems-Proceedings of CHES 2000 340

    Google Scholar 

  8. Goubin L., Patarin J., “DES and differential power analysis, the duplication method”, Cryptographic Hardware and Embedded Systems-Proceedings of CHES 1999 340

    Google Scholar 

  9. Messerges TS., “Securing the AES finalists against power analysis attacks”, Fast Sofware Encryption-Proceedings of FSE 2000 340

    Google Scholar 

  10. Coron JS., Goubin L., “On boolean and arithmetic masking against differential power analysis”, Cryptographic Hardware and Embedded Systems-Proceedings of CHES 2000 340

    Google Scholar 

  11. Akkar M, Giraud C, “An implementation of DES and AES, secure against some attacks”, Cryptographic Hardware and Embedded Systems-Proceedings of CHES 2001 340

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bevan, R., Knudsen, E. (2003). Ways to Enhance Differential Power Analysis. In: Lee, P.J., Lim, C.H. (eds) Information Security and Cryptology — ICISC 2002. ICISC 2002. Lecture Notes in Computer Science, vol 2587. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36552-4_23

Download citation

  • DOI: https://doi.org/10.1007/3-540-36552-4_23

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00716-6

  • Online ISBN: 978-3-540-36552-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics