Lightweight cryptography and DPA countermeasures: A survey

38Citations
Citations of this article
54Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full control over the pervasive device, additionally to the cryptographic attacks the whole field of physical attacks has to be considered. Most notably are here so-called side channel attacks, such as Differential Power Analysis (DPA) attacks. At the same time, the deployment of pervasive devices is strongly cost-driven, which prohibits expensive countermeasures. In this article we survey a broad range of countermeasures and discuss their suitability for ultra-constrained devices, such as passive RFID-tags. We conclude that adiabatic logic countermeasures, such as 2N-2N2P and SAL, seem to be promising candidates, because they increase the resistance against DPA attacks while at the same time lowering the power consumption of the pervasive device. © 2010 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Moradi, A., & Poschmann, A. (2010). Lightweight cryptography and DPA countermeasures: A survey. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6054 LNCS, pp. 68–79). https://doi.org/10.1007/978-3-642-14992-4_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free