Differential Power Analysis Model and Some Results
نویسندگان
چکیده
CMOS gates consume different amounts of power whether their output has a falling or a rising edge. Therefore the overall power consumption of a CMOS circuit leaks information about the activity of every single gate. This explains why, using differential power analysis (DPA), one can infer the value of specific nodes within a chip by monitoring its global power consumption only. We model the information leakage in the framework used by conventional cryptanalysis. The information an attacker can gain is derived as the autocorrelation of the Hamming weight of the guessed value for the key. This model is validated by an exhaustive electrical simulation. Our model proves that the DPA signal-to-noise ratio increases when the resistance of the substitution box against linear cryptanalysis increases. This result shows that the better shielded against linear cryptanalysis a block cipher is, the more vulnerable it is to side-channel attacks such as DPA.
منابع مشابه
A New Model for Analysis of Unusual Mal-Operation of Differential Protection Due to the Ultra-Saturation Phenomenon during the Loaded Power Transformer Energization
In this paper, a new model based on the thevenin equivalent circuit for investigating the ultra-saturation phenomenon during the energization of a loaded power transformer is presented and its effect on the differential protection of the transformer is considered. The ultra-saturation phenomenon causes the mal-operation of the power transformer differential protection. So, the description a...
متن کاملA New Model for Analysis of Unusual Mal-Operation of Differential Protection Due to the Ultra-Saturation Phenomenon during the Loaded Power Transformer Energization
In this paper, a new model based on the thevenin equivalent circuit for investigating the ultra-saturation phenomenon during the energization of a loaded power transformer is presented and its effect on the differential protection of the transformer is considered. The ultra-saturation phenomenon causes the mal-operation of the power transformer differential protection. So, the description a...
متن کاملDifferential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملDetermination of a new model to study ultra-saturation phenomenon during the loaded power transformer energization and its effect on differential protection
One of transient phenomenon that causes the mal-operation of the power transformer differential protection during the energization of a loaded power transformer is the ultra-saturation phenomenon. In this paper, a new model for investigating the ultra-saturation phenomenon during the energization of a loaded power transformer is presented and its effect on the differential protection of the pow...
متن کاملDetermination of a new model to study ultra-saturation phenomenon during the loaded power transformer energization and its effect on differential protection
One of transient phenomenon that causes the mal-operation of the power transformer differential protection during the energization of a loaded power transformer is the ultra-saturation phenomenon. In this paper, a new model for investigating the ultra-saturation phenomenon during the energization of a loaded power transformer is presented and its effect on the differential protection of the pow...
متن کاملOptimization of solution stiff differential equations using MHAM and RSK methods
In this paper, a nonlinear stiff differential equation is solved by using the Rosenbrock iterative method, modified homotpy analysis method and power series method. The approximate solution of this equation is calculated in the form of series which its components are computed by applying a recursive relations. Some numerical examples are studied to demonstrate the accuracy of the presented meth...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004