Abstract
In the previous chapter, we detailed the different simple models that could possibly be used to describe the behavior of CMOS devices. These models may allow an adversary to correlate the actual power consumption (monitored from the chip) with an hypothetical one depending on the key guess and the chosen model. As we will see in Chap. 6, a power consumption model can also be built from a training phase with a second identical device. Those attacks requiring a profiling training are known as Template Attack [AARR02] and Stochastic Models [SLP05]
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Extract from the wikipedia free encyclopedia, “White Noise”.
References
IEC 61967–4. Integrated circuits—Measurement of electromagnetic emissions, 150 kHz to 1 GHz. Part 4: Measurement of conducted emissions, \(1\Omega \)/\(150~\Omega \). Direct coupling method, 47A/636/FDIS, Final Draft International Standard, January 2002.
IEC 62014–3. Cookbook for Integrated Circuit model ICEM, project number 62014–3. Technical report, 2001.
Agrawal, D., Archambeault, B., Rao, J. R., & Rohatgi P. (2002). The EM side-channel(s). In B.S. Kaliski Jr., C.K. Koç, & C. Paar (Eds.), CHES, Lecture Notes in Computer Science (Vol. 2523, pp. 29–45). Heidelberg: Springer.
Atmel. 8-bit avr microcontroller atmega88 datasheet.
Ben Dhia, S., Ramdani,M., & Sicard E. (Eds.). (2006). Electromagnetic compatibility of integrated circuits techniques for low emission and susceptibility. Number ISBN: 0-387-26600-3. USA: Springer.
Johnson, H., & Graham M. (1993) High-speed digital design a handbook of black magic, 1st edn. Number ISBN: 10: 0133957241, 13: 978-0133957242. New Jersey: Prentice Hall PTR, Upper Saddle River.
Leon W., Couch, II. (1992). Digital and analog communication systems. USA : Prentice Hall PTR, Upper Saddle River, NJ.
Skorobogatov, S.P. (2005). Semi-invasive attacks—a new approach to hardware security analysis. Technical Report UCAM-CL-TR-630, University of Cambridge, Computer Laboratory.
Schindler, W., Lemke, K., & Paar C. (2005). A stochastic model for differential side channel cryptanalysis. In J.R. Rao, & B. Sunar (Eds.). CHES, Lecture Notes in Computer Science (Vol. 3659, pp. 30–46). Heidelberg: Springer.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Peeters, E. (2013). Measurement of the Power Consumption. In: Advanced DPA Theory and Practice. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6783-0_4
Download citation
DOI: https://doi.org/10.1007/978-1-4614-6783-0_4
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-6782-3
Online ISBN: 978-1-4614-6783-0
eBook Packages: EngineeringEngineering (R0)