Title
How To Decide Selection Functions For Power Analysis: From The Viewpoint Of Hardware Architecture Of Block Ciphers
Abstract
In this paper we first demonstrate that effective selection functions in power analysis attacks change depending on circuit architectures of a block cipher. We then conclude that the most resistant architecture on its own, in the case of the loop architecture, has two data registers have separate roles: one for storing the plaintext and ciphertext, and the other for storing intermediate values. There, the pre-whitening operation is placed at the output of the former register. The architecture allows the narrowest range of selection functions and thereby has resistance against ordinary CPA. Thus, we can easily defend against attacks by ordinary CPA at the architectural level, whereas we cannot against DPA. Secondly. we propose a new technique called "self-templates" in order to raise the accuracy of evaluation of DPA-based attacks. Self-templates enable to differentiate meaningful selection functions for DPA-based attacks without any strong assumption as in the template attack. We also present the results of attacks to an AES co-processor on an ASIC and demonstrate the effectiveness of the proposed technique.
Year
DOI
Venue
2011
10.1587/transfun.E94.A.200
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES
Keywords
Field
DocType
hardware architecture, differential power analysis, correlation power analysis, template attack
Template attack,Power analysis,Architecture,Block cipher,Computer science,Theoretical computer science,Application-specific integrated circuit,Ciphertext,Plaintext,Hardware architecture
Journal
Volume
Issue
ISSN
E94A
1
0916-8508
Citations 
PageRank 
References 
0
0.34
2
Authors
4
Name
Order
Citations
PageRank
Daisuke Suzuki130621.80
Minoru Saeki224314.88
Koichi Shimizu3665.05
Tsutomu Matsumoto41156197.58