Abstract
This tutorial will introduce you to the basics of the DPA (Differential Power Analysis)—a technique that exploits the dependency of the processed data on the power trace of the device to extract some secret information that would not be otherwise available. During the session you will learn how to process the power trace of the implementation of the AES encryption algorithm using an algebraic system (in our case MATLAB), create the power hypothesis, extract the secret information and also how to measure the power consumption of the embedded system (smart card) in order to obtain the power traces. The first part of the tutorial Differential Power Analysis—Key Recovery is aimed at explaining the creation of the power hypothesis and the use of algebraic systems. The second part of the tutorial DPA—measurement with an oscilloscope covers the practical part of the exercise—the measurement of the power consumption using the PicoScope.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mangard S, Oswald E, Popp T. Power analysis attacks: revealing the secrets of smart cards. US: Springer; 2008.
Tucci P. JSmartCardExplorer. https://www.primianotucci.com/os/smartcard-explorer. Accessed 02 Mar 2016.
Tucci P. JSmartCardExplorer. http://downloads.sourceforge.net/jsmartcard/JSmartCardExplorer.jar. Accessed 02 Mar 2016.
Picotech. PicoScope 6 software with drivers. http://downloads.picotech.com/winxp/PicoScope6_r6_8_11.exe. Accessed 02 Mar 2016.
Picotech. Software development kit. http://dl.picotech.com/drivers/PS5000sdk_r10_5_0_32.zip. Accessed 02 Mar 2016.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Buček, J., Novotný, M., Štěpánek, F. (2017). Practical Session: Differential Power Analysis for Beginners. In: Sklavos, N., Chaves, R., Di Natale, G., Regazzoni, F. (eds) Hardware Security and Trust. Springer, Cham. https://doi.org/10.1007/978-3-319-44318-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-44318-8_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44316-4
Online ISBN: 978-3-319-44318-8
eBook Packages: EngineeringEngineering (R0)