Hamming Distance Model Based Power Analysis for Cryptographic Algorithms

Article Preview

Abstract:

In order to evaluate the security of Application Specific Integrated Circuit (ASIC) implemented cryptographic algorithms at an early design stage, a Hamming distance model based power analysis is proposed. The Data Encryption Standard (DES) algorithm is taken as an example to illustrate the threats of differential power analysis (DPA) attack against the security of ASIC chip. A DPA attack against the ASIC implementation of a DES algorithm is realized based on hamming distance power model (HD model), and it realized the attack by successfully guessing the right 48-bit subkey. This result indicates that the power analysis attack based on the HD model is simple, rapid and effective for the design and evaluation of security chips.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

867-871

Citation:

Online since:

October 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Paul Kocher, Joshua Ja_e, and Benjamin Jun: Differential Power Analysis. CRYPTO'99 LNCS 1666, pp.388-397, (1999).

Google Scholar

[2] J. Kelsey, B. Schneier, D. Wagner, and C. Hall: Side Channel Cryptanalysis of Product Ciphers. Journal of Computer Security, v. 8, n. 2-3, pp.141-158, (2000).

DOI: 10.3233/jcs-2000-82-304

Google Scholar

[3] Messerges T S, Dabbish E A, Sloan R H: Investigations of power analysis attacks on smartcards. Proceedings of USENIX Workshop on Smartcard Technology May 1999, 151-161.

Google Scholar

[4] Messerges T S, Dabbish E A, Sloan R H: Examining smartcard security under the threat of power analysis attacks. IEEE Transactions on Computers, April, 2002, 51(4): 541-552.

DOI: 10.1109/tc.2002.1004593

Google Scholar

[5] Stefan Mangard, Elisabeth Oswald, Thomas Popp: Power Analysis Attacks, Springer Science Business Media, (2010).

Google Scholar

[6] ANSI X9. 32—American National Standard for Data Encryption Algorithm (DEA). Am. Standards Inst., (1981).

Google Scholar

[7] Thomas S. Messerges, Ezzat A. Dabbish, Robert H. Sloan: Examining Smart-Card Security under the Threat of Differential Power Analysis, IEEE TRANSACTIONS on computer, VOL. 51, NO. 5, May (2002).

DOI: 10.1109/tc.2002.1004593

Google Scholar