Power analysis attacks and countermeasures

被引:55
作者
Popp, Thomas [1 ]
Mangard, Stefan
Oswald, Elisabeth
机构
[1] Graz Univ Technol, Inst Appl Informat Proc & Commun, A-8010 Graz, Austria
[2] Infineon Technol, Secur Innovat Grp, Munich, Germany
[3] Univ Bristol, Dept Comp Sci, Bristol BS8 1TH, Avon, England
来源
IEEE DESIGN & TEST OF COMPUTERS | 2007年 / 24卷 / 06期
关键词
D O I
10.1109/MDT.2007.200
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
One of the biggest challenges of designers of cryptographic devices is to protect the devices against implementation attacks. Power analysis attacks are among the strongest of these attacks. This article provides an overview of power analysis attacks and discusses countermeasures against them. In particular, this article summarizes recent results with countermeasures that can be implemented at the cell level. Many countermeasures of this kind have been proposed, but several limitations of these countermeasures have been identified. © 2007 IEEE.
引用
收藏
页码:535 / 543
页数:9
相关论文
共 12 条
[1]  
Advanced Encryption Standard, 2001, FIPS PUB 197
[2]  
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[3]  
Fournier JJA, 2003, LECT NOTES COMPUT SC, V2779, P137, DOI 10.1007/978-3-540-45238-6_12
[4]  
Kocher Paul, 1999, LECT NOTES COMPUTER, P388, DOI DOI 10.1007/3-540-48405-1_25
[5]  
Kömmerling O, 1999, PROCEEDINGS OF THE USENIX WORKSHOP ON SMARTCARD TECHNOLOGY (SMARTCARD '99), P9
[6]  
Mangard S, 2005, LECT NOTES COMPUT SC, V3376, P351
[7]  
Mangard Stefan, 2007, POWER ANAL ATTACKS R
[8]  
Popp T, 2005, LECT NOTES COMPUT SC, V3659, P172
[9]  
SKORBOGATOV SP, 2005, THESIS U CAMBRIDGE
[10]  
Suzuki D, 2006, LECT NOTES COMPUT SC, V4249, P255