2005 18th Symposium on Integrated Circuits and Systems Design 2005
DOI: 10.1109/sbcci.2005.4286842
|View full text |Cite
|
Sign up to set email alerts
|

Current Mask Generation: A Transistor Level Security Against DPA Attacks

Abstract: The physical implementation of cryptographic algorithms may leak to some attacker security iniformation by the side channel data, as power consumption, timing, temperature or electromagnetic emanation. The Differential Power Analysis (DPA) is a powerful side channel attack, based only on the power consumption information. There are some countermeasures proposed at algorithmic or architectural level that are expensive and/or complexes. This paper addresses the DPA attack problem by a novel and efficient transis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2006
2006
2016
2016

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 16 publications
(18 reference statements)
0
9
0
Order By: Relevance
“…The first aspect has already been studied earlier, e.g., [18], [19]. In this paper, we are the first to study the second approach under the context of real-time systems.…”
Section: Attacker Modelmentioning
confidence: 89%
“…The first aspect has already been studied earlier, e.g., [18], [19]. In this paper, we are the first to study the second approach under the context of real-time systems.…”
Section: Attacker Modelmentioning
confidence: 89%
“…The traditional DPA attack relies on this asymmetry and it is expected to remain the major security threat to the standard complementary CMOS logic blocks [2]. In order to tackle the threat of side channel attacks many solutions have been proposed at the architectural level [12][13] [14] [15]. Major attempts have also been made to thwart the DPA threat by removing its root cause.…”
Section: Side Channel and Attacks Methodologiesmentioning
confidence: 99%
“…Some of these techniques try to suppress information leakage through power supply pin by means of: 1) an internally integrated filter [11]; 2) an internal voltage regulator [12], [13]; or 3) a current mask generator to maintain the total current of the circuit constant [14], [15].…”
Section: A State-of-the-artmentioning
confidence: 99%
“…The results which are shown in Figs. [13][14][15] indicate that-using the considered traces-there are potential DPA attacks on all cores. However, the tests based on the Sbox output bits of the protected core of chip 1 do not show a leakage as high as the other tests and the other cores.…”
Section: I(s; L) = H[s] − H[s|l]mentioning
confidence: 99%