Differential power analysis for cryptographic ICs

被引:0
|
作者
Chu Jie [1 ]
Zhao Qiang [1 ]
Ding Guoliang [1 ]
Deng Gaoming [1 ]
机构
[1] Mech Engn Coll, Dept Comp Engn, Shijiazhuang 050003, Peoples R China
关键词
SCA; DPA; IC; CMOS; data-dependent power consumption; DES;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Based on the concrete circuit of embedded system which was realized by AT89C52 microchips and encrypted with DES, the paper introduces the design and implementation of Differential Power Analysis (DPA) attack which is one of the typical and powerful ways of Side Channel Attacks (SCA). This paper explains the relations among the power consumption characters and data-dependent power consumption of CMOS logic gates which function the integrated circuits (ICs). With 10(5) plaintexts and power consumption samples, 48-bit key of the round 16 of DES was detected successfully. Then the rest 8 in 56-bit effective key of DES was detected easily by exhaustive attack. The result indicates that DES encrypted systems without special protective measures are not strong enough to survive from the attacks of DPA, because of the leakage of the emission of physical signals and the difference of power consumption while processing the different data in ICs.
引用
收藏
页码:292 / 295
页数:4
相关论文
共 50 条
  • [1] The Power of Electromagnetic Analysis on Embedded Cryptographic Ics
    Chen, Kaiyan
    Zhao, Qiang
    Zhang, Peng
    Deng, Gaoming
    [J]. 2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 197 - 201
  • [2] An Automatic Experimental Platform for Differential Electromagnetic Analysis on Cryptographic ICs
    Peng, Zhang
    Deng Gaoming
    Qiang, Zhao
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON TEST AUTOMATION & INSTRUMENTATION, VOLS 1-2, 2008, : 1078 - 1082
  • [3] Differential power analysis attack and power consumption model for cryptographic system
    Department of Computer Engineering, Ordnance Engineering College, Shijiazhuang 050003, China
    [J]. Huazhong Ligong Daxue Xuebao, 2008, 6 (18-21):
  • [4] A Novel AES Cryptographic Core Highly Resistant to Differential Power Analysis Attacks
    Ghellar, Felipe
    Lubaszewski, Marcelo S.
    [J]. SBCCI 2008: 21ST SYMPOSIUM ON INTEGRATED CIRCUITS AND SYSTEMS DESIGN, PROCEEDINGS, 2008, : 140 - +
  • [5] Hardware Trojans in Wireless Cryptographic ICs
    Jin, Yier
    Makris, Yiorgos
    [J]. IEEE DESIGN & TEST OF COMPUTERS, 2010, 27 (01): : 26 - 35
  • [6] Differential Power Analysis (DPA) Attack on Dual Field ECC Processor for Cryptographic Applications
    Suresh, Sam J.
    Manjushree, A.
    Eswaran, P.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,
  • [7] Asynchronous Cryptographic System: Side channel attacks through differential power analysis (DPA)
    Kim, Yeon-Ho
    Lee, Sang-Jin
    Kim, Kyu-Kwan
    You, Young-Gap
    Cho, Kyoung-Rok
    Cho, Tae-Won
    Eshraghian, Kamran
    [J]. WMSCI 2010: 14TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, 2010, : 39 - 42
  • [8] Differential Power Analysis Attacks to Precharged Buses: A General Analysis for Symmetric-Key Cryptographic Algorithms
    Alioto, Massimo
    Poll, Massimo
    Rocchi, Santina
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2010, 7 (03) : 226 - 239
  • [9] Transient Analysis of EM Radiation Associated with Information Leakage from Cryptographic ICs
    Hayashi, Yu-ichi
    Homma, Naofumi
    Aoki, Takafumi
    Okugawa, Yuichiro
    Akiyama, Yoshiharu
    [J]. 2013 9TH INTERNATIONAL WORKSHOP ON ELECTROMAGNETIC COMPATIBILITY OF INTEGRATED CIRCUITS (EMC COMPO 2013), 2013, : 78 - 82
  • [10] Differential Electromagnetic Analysis On AES Cryptographic System
    Ding, Guo-liang
    Li, Zhi-xiang
    Chang, Xiao-long
    Zhao, Qiang
    [J]. PROCEEDINGS OF THE 2009 SECOND PACIFIC-ASIA CONFERENCE ON WEB MINING AND WEB-BASED APPLICATION, 2009, : 120 - 123