Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/646764.703989guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Differential Power Analysis

Published: 15 August 1999 Publication History
  • Get Citation Alerts
  • Abstract

    Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. We also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.

    References

    [1]
    R. Anderson, M. Kuhn, "Low Cost Attacks on Tamper Resistant Devices," Security Protocol Workshop, April 1997, http://www.cl.cam.ac.uk/ftp/users/rja14/ tamper2.ps.gz.
    [2]
    R. Anderson and M. Kuhn, "Tamper Resistance - a Cautionary Note", The Second USENIX Workshop on Electronic Commerce Proceedings, November 1996, pp. 1- 11.
    [3]
    E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard , Springer-Verlag, 1993.
    [4]
    E. Biham and A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems," Advances in Cryptology: Proceedings of CRYPTO '97, Springer-Verlag, August 1997, pp. 513-525.
    [5]
    D. Boneh, R. DeMillo, and R. Lipton, "On the Importance of Checking Cryptographic Protocols for Faults," Advances in Cryptology: Proceedings of EUROCRYPT '97, Springer-Verlag, May 1997, pp. 37-51.
    [6]
    Jameco Electronics, "PC-MultiScope (part #142834)," February 1999 Catalog, p. 103.
    [7]
    P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Advances in Cryptology: Proceedings of CRYPTO '96, Springer-Verlag, August 1996, pp. 104-113.
    [8]
    M. Matsui, "The First Experimental Cryptanalysis of the Data Encryption Standard," Advances in Cryptology: Proceedings of CRYPTO '94, Springer-Verlag, August 1994, pp. 1-11.
    [9]
    National Bureau of Standards, "Data Encryption Standard," Federal Information Processing Standards Publication 46, January 1977.
    [10]
    National Institute of Standards and Technology, "Secure Hash Standard," Federal Information Processing Standards Publication 180-1, April 1995.
    [11]
    J. Dhem, F. Koeune, P. Leroux, P. MestrÉ, J. Quisquater, and J. Willems, "A practical implementation of the timing attack," UCL Crypto Group Technical Report Series: CG-1998/1, 1998.
    [12]
    R.L. Rivest, A. Shamir, and L.M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, 21, 1978, pp. 120-126.

    Cited By

    View all
    • (2024)Compositional Verification of First-Order Masking Countermeasures against Power Side-Channel AttacksACM Transactions on Software Engineering and Methodology10.1145/363570733:3(1-38)Online publication date: 14-Mar-2024
    • (2024)A Masked Hardware Accelerator for Feed-Forward Neural Networks With Fixed-Point ArithmeticIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2023.334055332:2(231-244)Online publication date: 1-Feb-2024
    • (2024)On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel AnalysisIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.332666719(514-528)Online publication date: 1-Jan-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    CRYPTO '99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
    August 1999
    638 pages
    ISBN:3540663479

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 15 August 1999

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Compositional Verification of First-Order Masking Countermeasures against Power Side-Channel AttacksACM Transactions on Software Engineering and Methodology10.1145/363570733:3(1-38)Online publication date: 14-Mar-2024
    • (2024)A Masked Hardware Accelerator for Feed-Forward Neural Networks With Fixed-Point ArithmeticIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2023.334055332:2(231-244)Online publication date: 1-Feb-2024
    • (2024)On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel AnalysisIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.332666719(514-528)Online publication date: 1-Jan-2024
    • (2024)DAC‐MDTransactions on Emerging Telecommunications Technologies10.1002/ett.495835:3Online publication date: 11-Mar-2024
    • (2024)A probably secure biometric‐based authentication and key agreement scheme for Internet of DronesTransactions on Emerging Telecommunications Technologies10.1002/ett.489335:1Online publication date: 15-Jan-2024
    • (2023)Collide+PowerProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620645(7285-7302)Online publication date: 9-Aug-2023
    • (2023)SPECTREMProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620589(6293-6310)Online publication date: 9-Aug-2023
    • (2023)Hot pixelsProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620588(6275-6292)Online publication date: 9-Aug-2023
    • (2023)A Survey on Machine Learning in Hardware SecurityACM Journal on Emerging Technologies in Computing Systems10.1145/358950619:2(1-37)Online publication date: 18-May-2023
    • (2023)FPGA Based Countermeasures against Side Channel Attacks on Block CiphersProceedings of the 28th Asia and South Pacific Design Automation Conference10.1145/3566097.3568353(365-371)Online publication date: 16-Jan-2023
    • Show More Cited By

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media