In this paper, techniques to perform power analysis attacks to snatch confidential data from cryptographic circuits are quantitatively compared. In particular, the popular Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) techniques are compared in terms of their effectiveness, explicitly considering both precharged and static logic styles. The analytical evaluation of the main parameters related to the attack allows for better understanding the differences between the two techniques, in contrast to qualitative comparisons that were recently published. Simulation results and experimental measurements on an FPGA implementation of the Advanced Encryption Standard (AES) algorithm are presented to validate the theoretical results.

Alioto, M.B.C., Poli, M., Rocchi, S. (2008). Power Analysis Attacks to Cryptographic Circuits: a Comparative Analysis of DPA and CPA. In Proc. of ICM 2008 (pp.333-336). New York : IEEE [10.1109/ICM.2008.5393827].

Power Analysis Attacks to Cryptographic Circuits: a Comparative Analysis of DPA and CPA

ALIOTO, MASSIMO BRUNO CRIS;S. ROCCHI
2008-01-01

Abstract

In this paper, techniques to perform power analysis attacks to snatch confidential data from cryptographic circuits are quantitatively compared. In particular, the popular Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) techniques are compared in terms of their effectiveness, explicitly considering both precharged and static logic styles. The analytical evaluation of the main parameters related to the attack allows for better understanding the differences between the two techniques, in contrast to qualitative comparisons that were recently published. Simulation results and experimental measurements on an FPGA implementation of the Advanced Encryption Standard (AES) algorithm are presented to validate the theoretical results.
2008
9781424423699
Alioto, M.B.C., Poli, M., Rocchi, S. (2008). Power Analysis Attacks to Cryptographic Circuits: a Comparative Analysis of DPA and CPA. In Proc. of ICM 2008 (pp.333-336). New York : IEEE [10.1109/ICM.2008.5393827].
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11365/17402
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo