1999
DOI: 10.1007/3-540-48405-1_26
|View full text |Cite
|
Sign up to set email alerts
|

Towards Sound Approaches to Counteract Power-Analysis Attacks

Abstract: Side channel cryptanalysis techniques, such as the analysis of instantaneous power consumption, have been extremely e ective i n attacking implementations on simple hardware platforms. There are several proposed solutions to resist these attacks, most of which are ad hoc and can easily be rendered ine ective. A scienti c approach is to create a model for the physical characteristics of the device, and then design implementations provably secure in that model, i.e, they resist generic attacks with an a priori b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

7
655
0
1

Year Published

2000
2000
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 784 publications
(672 citation statements)
references
References 3 publications
7
655
0
1
Order By: Relevance
“…Unfortunately, DiPA attacks can counteract masking countermeasures mentioned in ( [Mes00,CJRR99b]). The reason is the following: in their security proof, they are assuming that the information is extracted from several messages.…”
Section: Using Previous Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Unfortunately, DiPA attacks can counteract masking countermeasures mentioned in ( [Mes00,CJRR99b]). The reason is the following: in their security proof, they are assuming that the information is extracted from several messages.…”
Section: Using Previous Resultsmentioning
confidence: 99%
“…random permutations; -transformations of the data: i.e. public key blinding, Duplication method [GP99], masking methods [Mes00,CJRR99b].…”
Section: Countermeasuresmentioning
confidence: 99%
“…Moreover, brain scan techniques where the activities of various parts of the brain are studied by measuring the blood flow (which correlates with the energy consumption) also have an analog in cryptanalysis-namely power trace analysis: the secret key on a credit card is deduced from the pattern of its energy consumption when it is plugged into the card reader [264,307].…”
Section: The Vivisection Of the Cheshire Catmentioning
confidence: 99%
“…The first attack consists in directly interpreting power consumption measurements and the second attack also involves statistical tests. From then on, many papers describing either countermeasures or attack improvements have been published (see [1,4,6,21] for example).…”
Section: Introductionmentioning
confidence: 99%
“…To protect the calculus of the output of an S-Box against DPA, three main kinds of methods have been proposed in the literature. The first one, called the duplication method [6,13], consists in randomly splitting every piece of sensitive data in a constant number of blocks. Then, the computation can be securely carried out by performing calculations with these random blocks.…”
Section: Introductionmentioning
confidence: 99%