A Power Consumption Randomization Countermeasure for DPA-Resistant Cryptographic Processors

47Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Attacks based on a differential power analysis (DPA) are a main threat when designing cryptographic processors. In this paper, a countermeasure against DPA is presented and evaluated on a case study simulation. It can be implemented, using a standard digital technology, by applying a straightforward transformation to the original design, without an actual redesign. A methodology to perform a DPA in simulation is presented which can be exploited to test the resistance of a cryptographic processor during its design flow. By using the above methodology, the proposed countermeasure shows a 30dB attenuation of the signals exploited by the DPA. Keywords: Differential power analysis, DPA, power analysis, countermeasures, chipcards, cryptography. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Bucci, M., Guglielmo, M., Luzzi, R., & Trifiletti, A. (2004). A Power Consumption Randomization Countermeasure for DPA-Resistant Cryptographic Processors. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3254, 481–490. https://doi.org/10.1007/978-3-540-30205-6_50

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free