TY - GEN
T1 - Correlation power analysis based on switching glitch model
AU - Liu, Hongying
AU - Qian, Guoyu
AU - Goto, Satoshi
AU - Tsunoo, Yukiyasu
PY - 2011
Y1 - 2011
N2 - Power analysis attacks are based on analyzing the power consumption of the cryptographic devices while they perform the encryption operation. Correlation Power Analysis (CPA) attacks exploit the linear relation between the known power consumption and the predicted power consumption of cryptographic devices to recover keys. It has been one of the effective side channel attacks that threaten the security of CMOS circuits. However, few works consider the leakage of glitches at the logic gates. In this paper, we present a new power consumption model, namely Switching Glitch (SG) model, which not only considers the data dependent switching activities but also including glitch power consumptions in CMOS circuits. Additionally, from a theoretical point of view, we show how to estimate the glitch factor. The experiments against AES implementation validate the proposed model. Compared with CPA based on Hamming Distance model, the power traces of recovering keys have been decreased by as much as 28.9%.
AB - Power analysis attacks are based on analyzing the power consumption of the cryptographic devices while they perform the encryption operation. Correlation Power Analysis (CPA) attacks exploit the linear relation between the known power consumption and the predicted power consumption of cryptographic devices to recover keys. It has been one of the effective side channel attacks that threaten the security of CMOS circuits. However, few works consider the leakage of glitches at the logic gates. In this paper, we present a new power consumption model, namely Switching Glitch (SG) model, which not only considers the data dependent switching activities but also including glitch power consumptions in CMOS circuits. Additionally, from a theoretical point of view, we show how to estimate the glitch factor. The experiments against AES implementation validate the proposed model. Compared with CPA based on Hamming Distance model, the power traces of recovering keys have been decreased by as much as 28.9%.
KW - AES
KW - correlation power analysis (CPA)
KW - glitches
KW - Hamming Distance
KW - power leakage model
KW - side channel attacks
UR - http://www.scopus.com/inward/record.url?scp=79251538065&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79251538065&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-17955-6-14
DO - 10.1007/978-3-642-17955-6-14
M3 - Conference contribution
AN - SCOPUS:79251538065
SN - 3642179541
SN - 9783642179549
VL - 6513 LNCS
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 191
EP - 205
BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
T2 - 11th International Workshop on Information Security Applications, WISA 2010
Y2 - 24 August 2010 through 26 August 2010
ER -