Title
Polar differential power attacks and evaluation
Abstract
Side channel attacks (SCAs) on security software and hardware have become major concerns on computer and system security.The existing SCAs generally require the knowledge of the corresponding cryptographic algorithm and implementation adopted in the target; therefore,they are not fully suitable for practical applications.In this paper,we propose a novel SCA—polar differential power attack (polar DPA).We found that DPA peaks have different biases for different cryptographic algorithms and implementations.Based on these biases,we can successfully attack a block cipher,assuming that the cipher algorithm uses a secret key in its first round,without the knowledge of the cipher algorithm or implementation.Other rounds can be treated as a black box.We present a detailed theoretical analysis and experiment to demonstrate the correctness and efficiency of our scheme.Furthermore,our scheme has demonstrated an improvement over the leakage evaluation scheme due to Ichikawa et al.(CHES 2005).Our evaluation method can be used in electronic design automatic (EDA) flows and can help security circuit designers to understand the data leakage due to SCAs.
Year
DOI
Venue
2012
10.1007/s11432-012-4588-5
SCIENCE CHINA Information Sciences
Keywords
Field
DocType
side channel attack,differential power attack,computer security,polar,evaluation,differential,power
Black box (phreaking),Cipher,Power analysis,Mathematical optimization,Block cipher,Cryptography,Computer security,Correctness,Side channel attack,Stream cipher attack,Computer engineering,Mathematics
Journal
Volume
Issue
ISSN
55
7
1869-1919
Citations 
PageRank 
References 
2
0.38
22
Authors
7
Name
Order
Citations
PageRank
Ming Tang1387.26
zhenlong qui220.38
Si Gao374.01
Yi Mu418821.80
Shubo Liu58718.06
Huanguo Zhang621439.35
yingzhen jin720.38