Abstract
In [1] P. Kocher et al. introduced Differential Power Analysis (DPA), a statistical test (the difference of means) to retrieve secret keys from smart cards power consumption. For the correct hypothesis on the key, the difference of means is significantly different from zero. Hence a large peak is observed in the trace of the difference of means for the correct hypothesis. In the first part of this paper we explain why even with an arbitrarily large number of experiments, the difference of means is not always null for incorrect hypotheses on the key. We show further that peaks observed in the traces of the difference of means for incorrect hypotheses are inherent to the attacked algorithm and that this knowledge can be used to enhance power analysis attacks. Finally we propose another test that under some conditions efficiently detects the correct hypothesis even if incorrect hypotheses show larger peaks on the curves representing the difference of means. The combination of these methods can reduce the number of messages necessary to retrieve a key from a device by a factor greater than 2.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kocher P., Jaffe J., Jun B., “Differential power analysis”, Advances in Cryptology-Proceedings of CRYPTO’99 327
Chari S., Jutla CS., Rao JR., Rohatgi P.,“Towards sound approaches to counteract power analysis attacks”, Advances in Cryptology-Proceedings of CRYPTO’99 327, 328, 340
Messerges TS., “Using second-order power analysis to attack DPA resistant software”, Cryptographic Hardware and Embedded Systems-Proceedings of CHES 2000 327
Messerges TS., Dabbish EA., Sloan RH., “Investigations of power analysis attacks on smart cards”, Proceedings of the USENIX Workshop on Smart Card Technology 1999
Messerges TS., Dabbish EA., Sloan RH., “Examining Smart-Card Security under the Threat of Power Analysis Attacks”, IEEE Transactions on computers, Vol. 51, No. 5, May 2002 328, 337
Coron JS., Kocher P., Naccache D., “Statistics and secret leakage”, Proceedings of Financial Cryptography 2000 328, 336
Clavier C., Coron JS., Dabbous N., “Differential power analysis in the presence of hardware countermeasures”, Cryptographic Hardware and Embedded Systems-Proceedings of CHES 2000 340
Goubin L., Patarin J., “DES and differential power analysis, the duplication method”, Cryptographic Hardware and Embedded Systems-Proceedings of CHES 1999 340
Messerges TS., “Securing the AES finalists against power analysis attacks”, Fast Sofware Encryption-Proceedings of FSE 2000 340
Coron JS., Goubin L., “On boolean and arithmetic masking against differential power analysis”, Cryptographic Hardware and Embedded Systems-Proceedings of CHES 2000 340
Akkar M, Giraud C, “An implementation of DES and AES, secure against some attacks”, Cryptographic Hardware and Embedded Systems-Proceedings of CHES 2001 340
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bevan, R., Knudsen, E. (2003). Ways to Enhance Differential Power Analysis. In: Lee, P.J., Lim, C.H. (eds) Information Security and Cryptology — ICISC 2002. ICISC 2002. Lecture Notes in Computer Science, vol 2587. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36552-4_23
Download citation
DOI: https://doi.org/10.1007/3-540-36552-4_23
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00716-6
Online ISBN: 978-3-540-36552-5
eBook Packages: Springer Book Archive