2004
DOI: 10.1007/978-3-540-30205-6_50
|View full text |Cite
|
Sign up to set email alerts
|

A Power Consumption Randomization Countermeasure for DPA-Resistant Cryptographic Processors

Abstract: Attacks based on a differential power analysis (DPA) are a main threat when designing cryptographic processors. In this paper, a countermeasure against DPA is presented and evaluated on a case study simulation. It can be implemented, using a standard digital technology, by applying a straightforward transformation to the original design, without an actual redesign. A methodology to perform a DPA in simulation is presented which can be exploited to test the resistance of a cryptographic processor during its des… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2006
2006
2024
2024

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 39 publications
(29 citation statements)
references
References 9 publications
0
29
0
Order By: Relevance
“…The flow supports partitioning of a design between CMOS and protected logic, and includes a sound metric to measure resistance against side-channel attacks. Figure 1 depicts the design flow, which is an extension of prior simulationbased methodologies to evaluate resistance to power analysis attacks [6,22]. The key idea is to use commodity from EDA tools and to leverage on transistor level simulation to provide a high degree of accuracy.…”
Section: The Proposed Hybrid Design Flowmentioning
confidence: 99%
“…The flow supports partitioning of a design between CMOS and protected logic, and includes a sound metric to measure resistance against side-channel attacks. Figure 1 depicts the design flow, which is an extension of prior simulationbased methodologies to evaluate resistance to power analysis attacks [6,22]. The key idea is to use commodity from EDA tools and to leverage on transistor level simulation to provide a high degree of accuracy.…”
Section: The Proposed Hybrid Design Flowmentioning
confidence: 99%
“…In this project we describe a new flexible integrated simulation-based environment that allows validating a digital circuit when the device is attacked by means of this attack. With respect to the one proposed in [2], and with respect to all the custom-solutions implemented for a specific design, our solution allows to set most of the parameters and features (e.g., power consumption models, observation mechanisms, and statistical analysis) in such a way that different forms of DPA can be experimented. Then it generates the scripts required to perform the transistor level simulation of the circuit for a user defined vector set.…”
Section: Introductionmentioning
confidence: 99%
“…This measure can be implemented solely by careful modification of the cryptographic software, but delivers at best a moderate increase in security. A similar countermeasure was proposed in [3] for hardware implementations.…”
Section: Option 2: Random Prechargingmentioning
confidence: 99%