2008
DOI: 10.1109/tc.2008.109
|View full text |Cite
|
Sign up to set email alerts
|

Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks

Abstract: Logic styles with constant power consumption are promising solutions to counteract side-channel attacks on sensitive cryptographic devices. Recently, one vulnerability has been identified in a standard-cell based power-constant logic called WDDL. Another logic, nicknamed SecLib, is considered and does not present the flaw of WDDL. In this paper, we evaluate the security level of WDDL and SecLib. The methodology consists in embedding in a dedicated circuit one unprotected DES co-processor along with two others,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
5
3
2

Relationship

5
5

Authors

Journals

citations
Cited by 33 publications
(19 citation statements)
references
References 36 publications
(56 reference statements)
0
19
0
Order By: Relevance
“…In addition to template attacks, stochastic attacks (Schindler et al, 2005) have used the multivariate Gaussian noise distribution assumption to successfully profile and attack microcontrollers. Although not a profiling attack, mutual information analysis (MIA) is studied in Prouff and Rivain (2010) with the data encryption standard (DES) on an 8-bit smart card as well as on a SecMat V3/2 ASIC testbed (Guilley et al, 2008). MIA was found to be successful with few traces using a parametric estimation.…”
Section: Introductionmentioning
confidence: 99%
“…In addition to template attacks, stochastic attacks (Schindler et al, 2005) have used the multivariate Gaussian noise distribution assumption to successfully profile and attack microcontrollers. Although not a profiling attack, mutual information analysis (MIA) is studied in Prouff and Rivain (2010) with the data encryption standard (DES) on an 8-bit smart card as well as on a SecMat V3/2 ASIC testbed (Guilley et al, 2008). MIA was found to be successful with few traces using a parametric estimation.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, we restrict the number of hypotheses to those on the first round key, seen as eight classes of 6-bit each. Hence, an attack on the unprotected module using the HD can only concern R. Once again, experiments confirm that CPA is more powerful than the DPA in presence of noise (traces have not been averaged) [34]. Best results on unprotected implementations are obtained with the HD model, as it matches the physical phenomenon responsible for power consumption (commutations), and by targeting four bits at the same time, increasing the signal-to-noise (SNR) ratio of the correct peak with respect to the peaks present in incorrect guesses.…”
Section: Resultsmentioning
confidence: 71%
“…Even variancebased distinguishers as introduced in [35,3,27] can be made more efficient using NICV. As a preprocessing step, NICV can leverage metrics and distinguishers based on Linear Discriminant Analysis (LDA) [21] or on Principal Component Analysis (PCA) [16,21,34] are also using some kind of L 2 distance between classes (as does the NICV, see next section).…”
Section: General Backgroundmentioning
confidence: 99%