Correlation power analysis based on switching glitch model

Hongying Liu*, Guoyu Qian, Satoshi Goto, Yukiyasu Tsunoo

*この研究の対応する著者

研究成果: Conference contribution

5 被引用数 (Scopus)

抄録

Power analysis attacks are based on analyzing the power consumption of the cryptographic devices while they perform the encryption operation. Correlation Power Analysis (CPA) attacks exploit the linear relation between the known power consumption and the predicted power consumption of cryptographic devices to recover keys. It has been one of the effective side channel attacks that threaten the security of CMOS circuits. However, few works consider the leakage of glitches at the logic gates. In this paper, we present a new power consumption model, namely Switching Glitch (SG) model, which not only considers the data dependent switching activities but also including glitch power consumptions in CMOS circuits. Additionally, from a theoretical point of view, we show how to estimate the glitch factor. The experiments against AES implementation validate the proposed model. Compared with CPA based on Hamming Distance model, the power traces of recovering keys have been decreased by as much as 28.9%.

本文言語English
ホスト出版物のタイトルLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ページ191-205
ページ数15
6513 LNCS
DOI
出版ステータスPublished - 2011
イベント11th International Workshop on Information Security Applications, WISA 2010 - Jeju Island
継続期間: 2010 8月 242010 8月 26

出版物シリーズ

名前Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
6513 LNCS
ISSN(印刷版)03029743
ISSN(電子版)16113349

Other

Other11th International Workshop on Information Security Applications, WISA 2010
CityJeju Island
Period10/8/2410/8/26

ASJC Scopus subject areas

  • コンピュータ サイエンス(全般)
  • 理論的コンピュータサイエンス

フィンガープリント

「Correlation power analysis based on switching glitch model」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

引用スタイル