Publication detail

General Scheme of Differential Power Analysis

MARTINÁSEK, Z. ČLUPEK, V. TRÁSY, K.

Original Title

General Scheme of Differential Power Analysis

English Title

General Scheme of Differential Power Analysis

Type

conference paper

Language

en

Original Abstract

Power analysis observes the power consumption of cryptographic device depending on its activity and following attack uses the measured power traces to determine some sensitive information to abuse the device. Differential power analysis attacks are the most popular because the attacker does not need detailed knowledge about the attacked device but on the other hand, these attacks use mathematical approach and power consumption models. Understanding and the subsequent realization of the whole attack is not an easy task by no means. Therefore, this article describes the general schema on which all analyses are based on and best known statistical test including the basic power simulation models. We realized the best known power analysis based on correlation coefficient with a detailed description of the individual steps and we adjusted the general schema for this concrete example for better understanding of the attack. After reading the article, the reader is well familiarized about any context of the complex problems of differential power analysis.

English abstract

Power analysis observes the power consumption of cryptographic device depending on its activity and following attack uses the measured power traces to determine some sensitive information to abuse the device. Differential power analysis attacks are the most popular because the attacker does not need detailed knowledge about the attacked device but on the other hand, these attacks use mathematical approach and power consumption models. Understanding and the subsequent realization of the whole attack is not an easy task by no means. Therefore, this article describes the general schema on which all analyses are based on and best known statistical test including the basic power simulation models. We realized the best known power analysis based on correlation coefficient with a detailed description of the individual steps and we adjusted the general schema for this concrete example for better understanding of the attack. After reading the article, the reader is well familiarized about any context of the complex problems of differential power analysis.

Keywords

Differential power analysis, DPA, side channel

RIV year

2013

Released

06.07.2013

ISBN

978-1-4799-0403-7

Book

36th International Conference on Telecommunications and Signal Processing TSP

Pages from

358

Pages to

363

Pages count

5

BibTex


@inproceedings{BUT100442,
  author="Zdeněk {Martinásek} and Vlastimil {Člupek} and Krisztina {Trásy}",
  title="General Scheme of Differential Power Analysis",
  annote="Power analysis observes the power consumption of cryptographic device depending on its activity and following attack uses the measured power traces to determine some sensitive information to abuse the device.
Differential power analysis attacks are the most popular because the attacker does not need detailed knowledge about the attacked device but on the other hand, these attacks use mathematical approach and power consumption models.
Understanding and the subsequent realization of the whole attack is not an easy task by no means.
Therefore, this article describes the general schema on which all analyses are based on and best known statistical test including the basic power simulation models.
We realized the best known power analysis based on correlation coefficient with a detailed description of the individual steps and we adjusted the general schema for this concrete example for better understanding of the attack.
After reading the article, the reader is well familiarized about any context of the complex problems of differential power analysis.",
  booktitle="36th International Conference on Telecommunications and Signal Processing TSP",
  chapter="100442",
  howpublished="electronic, physical medium",
  year="2013",
  month="july",
  pages="358--363",
  type="conference paper"
}