In this paper, a model of the bus power consumption able to predict the results of a multi-bit Differential Power Attack (DPA) in symmetric-key cryptographic algorithm (e.g. AES, DES) is developed. The analytical results represent a theoretical basis to better understand the vulnerability to DPA attacks of cryptographic VLSI circuits. To the best of the authors' knowledge, this is the first paper that quantitatively evaluates the fundamental parameters that determine the effectiveness of DPA attacks to symmetric-key algorithms. The results are validated by means of SPICE simulations on the address bus of a MIPS32 architecture in a 0.18-mu m CMOS technology, with the MIPS32 being modeled by an in-house cycle-accurate simulator.
Alioto, M., Poli, M., Rocchi, S., Vignoli, V. (2007). A general model of DPA attacks to precharged busses in symmetric-key cryptographic algorithms. In Proc. of ECCTD 2007 (pp.368-371). New York : IEEE [10.1109/ECCTD.2007.4529609].
A general model of DPA attacks to precharged busses in symmetric-key cryptographic algorithms
Alioto, Massimo;Rocchi, Santina;Vignoli, Valerio
2007-01-01
Abstract
In this paper, a model of the bus power consumption able to predict the results of a multi-bit Differential Power Attack (DPA) in symmetric-key cryptographic algorithm (e.g. AES, DES) is developed. The analytical results represent a theoretical basis to better understand the vulnerability to DPA attacks of cryptographic VLSI circuits. To the best of the authors' knowledge, this is the first paper that quantitatively evaluates the fundamental parameters that determine the effectiveness of DPA attacks to symmetric-key algorithms. The results are validated by means of SPICE simulations on the address bus of a MIPS32 architecture in a 0.18-mu m CMOS technology, with the MIPS32 being modeled by an in-house cycle-accurate simulator.File | Dimensione | Formato | |
---|---|---|---|
A general model.pdf
non disponibili
Tipologia:
PDF editoriale
Licenza:
NON PUBBLICO - Accesso privato/ristretto
Dimensione
255 kB
Formato
Adobe PDF
|
255 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11365/17290
Attenzione
Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo