Abstract
The silicon industry has lately been focusing on side channel attacks, that is attacks that exploit information that leaks from the physical devices. Although different countermeasures to thwart these at- tacks have been proposed and implemented in general, such protections do not make attacks infeasible, but increase the attacker’s experimental (data acquisition) and computational (data processing) workload beyond reasonable limits. This paper examines different ways to attack devices featuring random process interrupts and noisy power consumption.
Chapter PDF
Similar content being viewed by others
References
R. Anderson, M. Kuhn, Tamper resistance-a cautionary note, The second usenix workshop on electronic commerce, pp. 1–11, 1996.
S. Chari, C. S. Jutla, J. R. Rao, P. Rohatgi, Towards Sound Approaches to Counteract Power-Analysis Attacks, Springer-Verlag, LNCS 1666, pp. 398–411, Crypto’99, 1999.
J.-S Coron, Resistance against Differential Power Analysis for Elliptic Curve Crytosystems, Springer-Verlag, LNCS 1717, pp. 292–302, CHES’99, 1999.
J.-S. Coron, P. Kocher, D. Naccache, Statistics and Secret Leakage, FC’00, to appear in the LNCS series, 2000.
P. N. Fahn, P. K. Pearson, IPA: A New Class of Power Attacks, Springer-Verlag, LNCS 1717, pp. 173–186, CHES’99, 1999.
L. Goubin, J. Patarin, DES and Differential Power Analysis, Springer-Verlag, LNCS 1717, pp. 158–172, CHES’99, 1999.
P. Kocher Differential Power Analysis, Springer-Verlag, LNCS 1666, pp. 388–397, Crypto’99, 1999.
P. Kocher Timing Attacks on Implementation of Diffe-Hellman, RSA, DSS, and Other Systems, Springer-Verlag, LNCS 1109, pp. 104–113, Crypto’96, 1996.
R. G. Lyons, Understanding Digital Signal Processing, Addison Wesley Longman, pp. 327–330, 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Clavier, C., Coron, JS., Dabbous, N. (2000). Differential Power Analysis in the Presence of Hardware Countermeasures. In: Koç, Ç.K., Paar, C. (eds) Cryptographic Hardware and Embedded Systems — CHES 2000. CHES 2000. Lecture Notes in Computer Science, vol 1965. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44499-8_20
Download citation
DOI: https://doi.org/10.1007/3-540-44499-8_20
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41455-1
Online ISBN: 978-3-540-44499-2
eBook Packages: Springer Book Archive