In this paper, a general model of multi-bit Differential Power Analysis (DPA) attacks to static logic circuits is proposed, with emphasis on symmetric-key cryptographic algorithms. The main parameters that are of interest in practical DPA attacks are analytically derived by introducing suitable approximations. Several interesting properties of DPA attacks are derived, allowing a deep understanding of the vulnerability of algorithms and circuits. The proposed model was validated by means of experimental measurements on an FPGA implementation of the Advanced Encryption Standard (AES) algorithm. The model accuracy is shown to be adequate, as the resulting error is always lower than 11%.
Alioto, M.B.C., Poli, M., Rocchi, S. (2008). A general model for differential power analysis attacks to static logic circuits. In ISCAS 2008. IEEE International Symposium on Circuits and Systems (pp.3346-3349). New York : IEEE [10.1109/ISCAS.2008.4542175].
A general model for differential power analysis attacks to static logic circuits
ALIOTO, MASSIMO BRUNO CRIS;ROCCHI, SANTINA
2008-01-01
Abstract
In this paper, a general model of multi-bit Differential Power Analysis (DPA) attacks to static logic circuits is proposed, with emphasis on symmetric-key cryptographic algorithms. The main parameters that are of interest in practical DPA attacks are analytically derived by introducing suitable approximations. Several interesting properties of DPA attacks are derived, allowing a deep understanding of the vulnerability of algorithms and circuits. The proposed model was validated by means of experimental measurements on an FPGA implementation of the Advanced Encryption Standard (AES) algorithm. The model accuracy is shown to be adequate, as the resulting error is always lower than 11%.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11365/35774
Attenzione
Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo