Abstract
Under a simple power leakage model based on Hamming weight, a software implementation of a data-whitening routine is shown to be vulnerable to a first-order Differential Power Analysis (DPA) attack. This routine is modified to resist the first-order DPA attack, but is subsequently shown to be vulnerable to a second-order DPA attack. A second-order DPA attack that is optimal under certain assumptions is also proposed. Experimental results in an ST16 smartcard confirm the practicality of the first and second-order DPA attacks.
Chapter PDF
Similar content being viewed by others
Keywords
- Power Consumption
- Power Signal
- Differential Power Analysis
- Advanced Encryption Standard Algorithm
- Cryptographic Hardware
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
J. Kelsey, B. Schneier, D. Wagner, and C. Hall, “Side Channel Cryptanalysis of Product Ciphers,” in Proceedings of ESORICS’ 98, Springer-Verlag, September 1998, pp. 97–110.
Paul Kocher, Joshua Jaffe, and Benjamin Jun, “Differential Power Analysis,” in proceedings of Advances in Cryptology-CRYPTO’ 99, Springer-Verlag, 1999, pp. 388–397.
Thomas S. Messerges, Ezzy A. Dabbish, and Robert H. Sloan, “Investigations of Power Analysis Attacks on Smartcards,” Proceedings of USENIX Workshop on Smartcard Technology, May 1999, pp. 151–161.
Eli Biham and Adi Shamir, “Power Analysis of the Key Scheduling of the AES Candidates,” Second Advanced Encryption Standard Candidate Conference, March 1999, http://www.nist.gov/aes.
S. Chari, C. Jutla, J. R. Rao, and P. Rohatgi, “A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards,” Second Advanced Encryption Standard Candidate Conference, http://www.nist.gov/aes, March 1999.
Thomas S. Messerges, Ezzy A. Dabbish, and Robert H. Sloan, “Power Analysis Attacks of Modular Exponentiation in Smartcards,” in proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Springer-Verlag, August 1999, pp. 144–157.
Jean-Sébastien Coron, “Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems,” in proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Springer-Verlag, August 1999, pp. 292–302.
Louis Goubin and Jacques Patarin, “DES and Differential Power Analysis — The Duplication Method,” in proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Springer-Verlag, August 1999, pp. 158–172.
Thomas S. Messerges, “Securing the AES Finalists Against Power Analysis Attacks,” in proceedings of Fast Software Encryption Workshop 2000, Springer-Verlag, April 2000.
Suresh Chari, Charanjit S. Jutla, Josyula R. Rao and Pankaj J. Rohatgi, “Towards Sound Approaches to Counteract Power-Analysis Attacks,” in proceedings of Advances in Cryptology-CRYPTO’ 99, Springer-Verlag, 1999, pp. 398–412.
Joan Daemen, Michael Peeters and Gilles Van Assche, “Bitslice Ciphers and Power Analysis Attacks,” in proceedings of Fast Software Encryption Workshop 2000, Springer-Verlag, April 2000.
Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall and Niels Ferguson, The Twofish Encryption Algorithm: A 128-Bit Block Cipher, John Wiley & Sons, 1999, ISBN: 0471353817.
S. W. Moore, R. Anderson and M. Kuhn, “Self-timed Technology to Reduce Smartcard Fraud,” in proceedings of ACiD-WG Workshop, Grenoble, February 2000.
Joep Kessels, “Applying Asynchronous Circuits in Contactless Smartcards,” in proceedings of ACiD-WG Workshop, Grenoble, February 2000.
Jean-Sébastien Coron, Paul Kocher and David Naccache, “Statistics and Secret Leakage,” in proceedings of Financial Cryptography, Springer-Verlag, February 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Messerges, T.S. (2000). Using Second-Order Power Analysis to Attack DPA Resistant Software. In: Koç, Ç.K., Paar, C. (eds) Cryptographic Hardware and Embedded Systems — CHES 2000. CHES 2000. Lecture Notes in Computer Science, vol 1965. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44499-8_19
Download citation
DOI: https://doi.org/10.1007/3-540-44499-8_19
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41455-1
Online ISBN: 978-3-540-44499-2
eBook Packages: Springer Book Archive