Abstract
We propose a new differential power analysis (DPA) countermeasure based on the “masking method” proposed by Messerges [11]. We also evaluate the security of our method by introducing a new idea of “probabilistic DPA.” Its processing speed is as fast as that of the straight-forward implementation, and it requires little RAM so it is suitable for low-cost smartcards.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Mehdi-Larurent Akkar, Regis Bevan, Paul Dischamp and Didier Moyart, “Power Analysis, What is Now Possible...”, Advances in Cryptology-ASIACRYPT 2000, pp.489–502.
Mehdi-Larurent Akkar, Chiristophe Giraud, “An implementation of DES and AES, secure against some attacks”, Cryptographic Hardware and Embedded Systems (CHES 2001).
Suresh Chari, Charanjit S. Jutla, Josyula R. Rao and Pankaj Rohtagi, “A cautionary note regarding evaluation of AES candidates on smart-cards”, AES round 2.
Suresh Chari, Charanjit S. Julta, Josyula R. Rao and Pankaj Rohtagi, “Towards Sound Apporoaches to Counteract Power-Analysis Attacks”, Advances in Cryptography-CRYPTO’99, pp.398–412.
Christophe Clavier and Marc Joye, “Universal Exponentiation Algorithm-A FirstStep Towards Provable SPA-resistence-”, Cryptographic Hardware and Embedded Systems (CHES 2001).
Jean-Sébastein Coron, “Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems”, Cryptographic Hardware and Embedded Systems (CHES’99), pp.292–302.
Jean-Sébastein Coron and Louis Goubin, “On Boolean and Arithmetic Masking against Differential Power Analysis”, Cryptographic Hardware and Embedded Systems, Cryptographic Hardware and Embedded Systems (CHES 2000), pp.231–237.
Louis Goubin and Jacques Patarin, “DES and Differential Power Analysis.-The Duplication Method-”, Cryptographic Hardware and Embedded Systems (CHES 2001).
Marc Joye and Christphe Tymen, “Protection against Differential Analysis for Elliptic Curve Cryptography-An Algebraic Apporoach-”, Cryptographic Hardware and Embedded Systems (CHES 2001).
Paul Kocher, Joshua Jaffe, and Benjamin Jun “Differential Power Analysis”, Advances in Cryptography-CRYPTO’99, pp.388–397.
Thomas S. Messerges, Ezzy A. Dabbish and Robert H. Sloan “Power Analysis Attacks of Modular Exponentiation in Smartcards.”, Cryptographic Hardware and Embedded Systems (CHES’99), pp.144–157.
Thomas S. Messerges, “Securing the AES Finialists Against Power Analysis Attacks”, Fast Software Encryption (FSE 2000), pp.150–164.
Thomas S. Messerges, “Using Second-Order Power Analysis to Attack DPA Resistant Software”, Cryptographic Hardware and Embedded Systems (CHES 2000), pp.238–251.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Itoh, K., Takenaka, M., Torii, N. (2002). DPA Countermeasure Based on the “Masking Method”. In: Kim, K. (eds) Information Security and Cryptology — ICISC 2001. ICISC 2001. Lecture Notes in Computer Science, vol 2288. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45861-1_33
Download citation
DOI: https://doi.org/10.1007/3-540-45861-1_33
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43319-4
Online ISBN: 978-3-540-45861-6
eBook Packages: Springer Book Archive