Title :
Key dependent operation and algorithm specific complexity of statistical side channel attacks
Author :
Rüdinger, Jens ; Finger, Adolf
Author_Institution :
Vodafone D2 GmbH, Dusseldorf, Germany
Abstract :
This paper analyzes the design of cryptographic algorithm and the effect of their vulnerability towards statistical side channel attacks. On the example of the DPA (differential power attack) attack by Kocher the complexity of the statistical side channel attacks and their dependency on algorithmic parameters is shown. In particular key dependent operation are considered and their effect is illustrated on the example of the block cipher algorithm AES and Twofish. It is shown that the careful selection or design of algorithms can increase the security of implementations of algorithms in addition to and independent from conventional DPA attack counter-measures.
Keywords :
communication complexity; computer networks; cryptography; telecommunication channels; telecommunication security; AES algorithm; DPA attack; Twofish algorithm; algorithm specific complexity; algorithmic parameter; block cipher; cryptographic algorithm; differential power attack; key dependent operation; secret key security; statistical side channel attack; Algorithm design and analysis; Authentication; Cost function; Cryptography; Electromagnetic analysis; Fingers; Runtime; Security; Smart cards; Timing;
Conference_Titel :
Telecommunications, 2009. ICT '09. International Conference on
Conference_Location :
Marrakech
Print_ISBN :
978-1-4244-2936-3
Electronic_ISBN :
978-1-4244-2937-0
DOI :
10.1109/ICTEL.2009.5158645