DocumentCode :
3541931
Title :
Leakage Power Analysis attacks: Well-defined procedure and first experimental results
Author :
Alioto, M. ; Giancane, L. ; Scotti, G. ; Trifiletti, A.
Author_Institution :
Dipt. di Ing. dell´´Inf., Univ. di Siena, Siena, Italy
fYear :
2009
fDate :
19-22 Dec. 2009
Firstpage :
46
Lastpage :
49
Abstract :
In this paper, attacks aiming at recovering the secret key of a cryptographic core from measurements of its static (leakage) power are presented. These attacks exploit the dependence of the leakage current of CMOS Integrated Circuits (ICs) on their inputs (e.g., the secret key of a cryptographic circuit). For this reason, these novel attacks are referred to as Leakage Power Analysis (LPA) attacks in this paper. Since the leakage power increases much faster than the dynamic power at each new technology node, LPA attacks are shown to be a serious threat to information security of cryptographic circuits in sub-100 nm technologies. For the first time in the literature, a well-defined procedure to perform LPA attacks is presented. Advantages and measurement issues are also analyzed in comparison with traditional Power Analysis attacks based on dynamic power measurements. An experimental attack to a register is finally performed for the first time.
Keywords :
CMOS logic circuits; cryptography; leakage currents; logic gates; CMOS integrated circuits; CMOS logic gates; LPA attacks; cryptographic circuits; dynamic power measurements; information security; leakage current; leakage power analysis attacks; CMOS logic circuits; CMOS technology; Cryptography; Data security; Energy consumption; Information security; Leakage current; Power measurement; Registers; Semiconductor device measurement;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Microelectronics (ICM), 2009 International Conference on
Conference_Location :
Marrakech
Print_ISBN :
978-1-4244-5814-1
Type :
conf
DOI :
10.1109/ICM.2009.5418592
Filename :
5418592
Link To Document :
بازگشت