DocumentCode :
2312359
Title :
Practical evaluation of DPA countermeasures on reconfigurable hardware
Author :
Moradi, Amir ; Mischke, Oliver ; Paar, Christof
Author_Institution :
Horst Gortz Inst. for IT Security, Ruhr Univ. Bochum, Bochum, Germany
fYear :
2011
fDate :
5-6 June 2011
Firstpage :
154
Lastpage :
160
Abstract :
In CHES 2010 a correlation-based power analysis collision attack has been introduced which is supposed to exploit any first-order leakage of cryptographic devices. This work examines the effectiveness of the well-known DPA countermea-sures versus the correlation collision attack. The considered countermeasures include masking, shuffling, and noise addition, when applied in hardware. Practical evaluations, which all have been performed using power traces measured from an FPGA board, show an increase in the number of required traces, e.g. from 10,000 to 1,500,000, when combining different counter-measures. This study allows for a fair comparison between the hardware countermeasures and helps identifying an appropriate key lifetime.
Keywords :
computer crime; cryptography; field programmable gate arrays; reconfigurable architectures; CHES 2010; DPA countermeasure; FPGA board; correlation based power analysis collision attack; cryptographic device; first order leakage; noise addition; reconfigurable hardware; Clocks; Computer architecture; Correlation; Encryption; Power demand; Registers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Hardware-Oriented Security and Trust (HOST), 2011 IEEE International Symposium on
Conference_Location :
San Diego CA
Print_ISBN :
978-1-4577-1059-9
Type :
conf
DOI :
10.1109/HST.2011.5955014
Filename :
5955014
Link To Document :
بازگشت