DocumentCode :
2442145
Title :
Key dependent operation and algorithm specific complexity of statistical side channel attacks
Author :
Rüdinger, Jens ; Finger, Adolf
Author_Institution :
Vodafone D2 GmbH, Dusseldorf, Germany
fYear :
2009
fDate :
25-27 May 2009
Firstpage :
208
Lastpage :
212
Abstract :
This paper analyzes the design of cryptographic algorithm and the effect of their vulnerability towards statistical side channel attacks. On the example of the DPA (differential power attack) attack by Kocher the complexity of the statistical side channel attacks and their dependency on algorithmic parameters is shown. In particular key dependent operation are considered and their effect is illustrated on the example of the block cipher algorithm AES and Twofish. It is shown that the careful selection or design of algorithms can increase the security of implementations of algorithms in addition to and independent from conventional DPA attack counter-measures.
Keywords :
communication complexity; computer networks; cryptography; telecommunication channels; telecommunication security; AES algorithm; DPA attack; Twofish algorithm; algorithm specific complexity; algorithmic parameter; block cipher; cryptographic algorithm; differential power attack; key dependent operation; secret key security; statistical side channel attack; Algorithm design and analysis; Authentication; Cost function; Cryptography; Electromagnetic analysis; Fingers; Runtime; Security; Smart cards; Timing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Telecommunications, 2009. ICT '09. International Conference on
Conference_Location :
Marrakech
Print_ISBN :
978-1-4244-2936-3
Electronic_ISBN :
978-1-4244-2937-0
Type :
conf
DOI :
10.1109/ICTEL.2009.5158645
Filename :
5158645
Link To Document :
بازگشت