Skip to main content

A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks

  • Conference paper
  • First Online:
Cryptography and Coding (Cryptography and Coding 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2260))

Included in the following conference series:

Abstract

The classic “black-box” view of cryptographic devices such as smart cards has been invalidated by the advent of the technique of Differential Power Analysis (DPA) for observing intermediate variables during normal operation through side-channel observations. An information-theoretic approach leads to optimal DPA attacks and can provide an upper bound on the rate of information leakage, and thus provides a sound basis for evaluating countermeasures. This paper presents a novel technique of random affine mappings as a DPA countermeasure. The technique increases the number of intermediate variables that must be observed before gleaning any secret information and randomly varies these variables on every run. This is done without duplication of the processing of variables, allowing very efficient DPA resistant cipher implementations where the ciphers are designed to minimise overheads. A realworld system has been developed within the tight computational constraints of a smart card to exhibit first-order DPA-resistance for all key processing.

Patent pending

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Paul C. Kocher: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Advances in Cryptology: Proceedings of CRYPTO’ 96, Springer-Verlag, August, 1996, 104–113.

    Google Scholar 

  2. Paul Kocher, Joshua Jaffe and Benjamin Jun: Differential Power Analysis, Advances in Cryptology: Proceedings of CRYPTO’ 99, Springer-Verlag, August, 1999, 388–397.

    Google Scholar 

  3. Paul Kocher, Joshua Jaffe and Benjamin Jun: Introduction to Differential Power Analysis and Related Attacks, http://www.cryptography.com/dpa/technical/index.html, 1998.

  4. Suresh Chari, Charanjit S. Jutla, Josyula R. Rao and Pankaj Rohatgi: Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology: Proceedings of CRYPTO’ 99, Springer-Verlag, August1999, 398–412.

    Google Scholar 

  5. Louis Goublin and Jacques Patarin: “DES and Differential Power Analysis-The Duplication Method”, Cryptographic Hardware and Embedded Systems International Workshop, August 1999, 158–172.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

von Willich, M. (2001). A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks. In: Honary, B. (eds) Cryptography and Coding. Cryptography and Coding 2001. Lecture Notes in Computer Science, vol 2260. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45325-3_6

Download citation

  • DOI: https://doi.org/10.1007/3-540-45325-3_6

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43026-1

  • Online ISBN: 978-3-540-45325-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics