Side-channel attacks, countermeasures, and evaluations

From NUEESS

(Difference between revisions)
Jump to: navigation, search
(Models)
(Models)
Line 5: Line 5:
==Models==
==Models==
-
Both DPA and CPA shares a common assumption, which is, a cryptographic system will consume power when its output state changes. This assumption is reasonable, since most modern cryptographic systems are implemented based on semiconductor technology. Output state change means there are electrons charged to, or discharged from the semiconductor transistors, causing current flow and resulting in power consumption. This kind of output state change is also called transition. We will take DES (Data Encryption Standard) as an example to illustrate the DPA and CPA procedure.
+
Both DPA and CPA shares a common assumption, which is, a cryptographic system will consume power when its output state changes. This assumption is reasonable, since most modern cryptographic systems are implemented based on semiconductor technology. Output state change means there are electrons charged to, or discharged from the semiconductor transistors, causing current flow and resulting in power consumption. This kind of output state change is also called transition. We will take [http://en.wikipedia.org/wiki/Data_Encryption_Standard DES] (Data Encryption Standard) as an example to illustrate the DPA and CPA procedure.
==Evaluations==
==Evaluations==

Revision as of 15:58, 1 August 2012

General

Side channel attack on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis attack is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly. The two most widely developed techniques for power analysis attacks are DPA (Differential Power Analysis) and CPA (Correlation Power Analysis).

Models

Both DPA and CPA shares a common assumption, which is, a cryptographic system will consume power when its output state changes. This assumption is reasonable, since most modern cryptographic systems are implemented based on semiconductor technology. Output state change means there are electrons charged to, or discharged from the semiconductor transistors, causing current flow and resulting in power consumption. This kind of output state change is also called transition. We will take DES (Data Encryption Standard) as an example to illustrate the DPA and CPA procedure.

Evaluations





Whos here now:   Members 0   Guests 0   Bots & Crawlers 4
 
Personal tools