DocumentCode :
3250838
Title :
General scheme of differential power analysis
Author :
Martinasek, Zdenek ; Clupek, Vlastimil ; Krisztina, Trasy
Author_Institution :
Brno Univ. of Technol., Brno, Czech Republic
fYear :
2013
fDate :
2-4 July 2013
Firstpage :
358
Lastpage :
362
Abstract :
Power analysis observes the power consumption of cryptographic device depending on its activity and following attack uses the measured power traces to determine some sensitive information to abuse the device. Differential power analysis attacks are the most popular because the attacker does not need detailed knowledge about the attacked device but on the other hand, these attacks use mathematical approach and power consumption models. Understanding and the subsequent realization of the whole attack is not an easy task by no means. Therefore, this article describes the general schema on which all analyses are based on and best known statistical test including the basic power simulation models. We realized the best known power analysis based on correlation coefficient with a detailed description of the individual steps and we adjusted the general schema for this concrete example for better understanding of the attack. After reading the article, the reader is well familiarized about any context of the complex problems of differential power analysis.
Keywords :
cryptography; statistical analysis; basic power simulation model; correlation coefficient; cryptographic device; detailed description; differential power analysis attack; power consumption; power trace; statistical test; Algorithm design and analysis; Correlation; Cryptography; Mathematical model; Power demand; Power measurement; Vectors; DPA; Differential power analysis; side channel;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Telecommunications and Signal Processing (TSP), 2013 36th International Conference on
Conference_Location :
Rome
Print_ISBN :
978-1-4799-0402-0
Type :
conf
DOI :
10.1109/TSP.2013.6613952
Filename :
6613952
Link To Document :
بازگشت