DocumentCode :
434518
Title :
On the masking countermeasure and higher-order power analysis attacks
Author :
Standaert, Francois-Xavier ; Peeters, Eric ; Quisquater, Jean-Jacques
Author_Institution :
UCL Crypto Group, Louvain-La-Neuve, Belgium
Volume :
1
fYear :
2005
fDate :
4-6 April 2005
Firstpage :
562
Abstract :
Masking is a general method used to thwart differential power analysis, in which all the intermediate data inside an implementation are XORed with random Boolean values. As a consequence, the power consumption of the running implementation becomes unpredictable, making first-order power analysis attacks unpractical. Several recent works have shown that such protected designs are still susceptible to higher-order power analysis attacks. In this paper, we propose an extension of the previously introduced higher-order techniques, based on a more general power consumption model, and evaluate its actual feasibility. In particular, we discuss the number of power traces required to mount successful attacks. We also illustrate how this number is affected by parallel computations, making certain implementation contexts (e.g. smart cards, 8-bit processors) more susceptible than others (e.g. FPGAs, ASICs).
Keywords :
cryptography; parallel processing; 8-bit processors; ASIC; FPGA; differential power analysis; higher-order power analysis attacks; higher-order techniques; intermediate data; masking countermeasure; parallel computations; power trace; random Boolean values; smart cards; Algorithm design and analysis; Circuits; Concurrent computing; Cryptography; Energy consumption; Field programmable gate arrays; Hardware; Protection; Security; Smart cards;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Technology: Coding and Computing, 2005. ITCC 2005. International Conference on
Print_ISBN :
0-7695-2315-3
Type :
conf
DOI :
10.1109/ITCC.2005.213
Filename :
1428522
Link To Document :
بازگشت