On the relationship between correlation power analysis and the stochastic approach: An ASIC designer perspective

10Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The design and the security verification of side-channel resistant cryptographic hardware often represent an iterative process. This process essentially consists of a detection phase (), where the information leakage is identified and a correction phase (), where design flaws are corrected. Correlation Power Analysis (CPA) and the Stochastic Approach (SA) are two candidate tools to perform the and to support designers in the. However, until now, the relationship between these two tools has not been discussed yet and it is uncertain from a designer point of view, what informative feedback can be gained from these methods, especially when it comes to evaluate high-dimensional leakage models. In this work, we investigate the relationship between CPA and the SA from both a mathematical and empirical point of view. In particular, we demonstrate that the informative feedback provided by the SA is transferable to a linear combination of CPA attacks and discuss the implications of this entanglement, when it comes to pinpoint the high-dimensional leakage of simulated leakage data and simulated power traces of an ASIC implementation of Present. © 2013 Springer International Publishing Switzerland.

Cite

CITATION STYLE

APA

De Santis, F., Kasper, M., Mangard, S., Sigl, G., Stein, O., & Stöttinger, M. (2013). On the relationship between correlation power analysis and the stochastic approach: An ASIC designer perspective. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8250 LNCS, pp. 215–226). Springer Verlag. https://doi.org/10.1007/978-3-319-03515-4_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free