메뉴 건너뛰기




Volumn 94, Issue 2, 2006, Pages 383-394

An overview of power analysis attacks against field programmable gate arrays

Author keywords

Block ciphers; Cryptographic hardware; Field programmable gate array (FPGA); Physical security; Power analysis; Side channel attacks

Indexed keywords

ALGORITHMS; COMPUTER HARDWARE; COSTS; POWER ELECTRONICS; PROGRAMMABLE LOGIC CONTROLLERS; SECURITY SYSTEMS; SMART CARDS; THEOREM PROVING;

EID: 31344461368     PISSN: 00189219     EISSN: None     Source Type: Journal    
DOI: 10.1109/JPROC.2005.862437     Document Type: Conference Paper
Times cited : (107)

References (48)
  • 1
    • 84937438279 scopus 로고    scopus 로고
    • Power analysis, what is now possible
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • M. L. Akkar, R. Bevan, P. Dischamp, and D. Moyart, "Power analysis, what is now possible," in Advances in Cryptology - ASI-ACRYPT 2000. Heidelberg, Germany: Springer-Verlag, 2000, vol. 1976, Lecture Notes in Computer Science, pp. 489-502.
    • (2000) Advances in Cryptology - ASI-ACRYPT 2000 , vol.1976 , pp. 489-502
    • Akkar, M.L.1    Bevan, R.2    Dischamp, P.3    Moyart, D.4
  • 2
    • 84943615552 scopus 로고    scopus 로고
    • An implementation of des and AES secure againts some attacks
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • M. L. Akkar and C. Giraud, "An implementation of DES and AES secure againts some attacks," in Cryptographic Hardware and Embedded Systems - CHES 2001. Heidelberg, Germany: Springer-Verlag, 2001, vol. 2162, Lecture Notes in Computer Science, pp. 309-318.
    • (2001) Cryptographic Hardware and Embedded Systems - CHES 2001 , vol.2162 , pp. 309-318
    • Akkar, M.L.1    Giraud, C.2
  • 4
    • 27244456338 scopus 로고    scopus 로고
    • Ways to enhance differential power analysis
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • R. Bevan and E. Knudsen, "Ways to enhance differential power analysis," in Information Security and Technology - ICISC 2002. Heidelberg, Germany: Springer-Verlag, 2002, vol. 2587, Lecture Notes in Computer Science, pp. 327-342.
    • (2002) Information Security and Technology - ICISC 2002 , vol.2587 , pp. 327-342
    • Bevan, R.1    Knudsen, E.2
  • 6
    • 35048818034 scopus 로고    scopus 로고
    • Correlation power analysis with a leakage model
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • E. Brier, C. Clavier, and F. Olivier, "Correlation power analysis with a leakage model," in Cryptographic Hardware and Embedded Systems - CHES 2004. Heidelberg, Germany: Springer-Verlag, 2004, vol. 3156, Lecture Notes in Computer Science, pp. 16-29.
    • (2004) Cryptographic Hardware and Embedded Systems - CHES 2004 , vol.3156 , pp. 16-29
    • Brier, E.1    Clavier, C.2    Olivier, F.3
  • 7
    • 31344464000 scopus 로고    scopus 로고
    • On the maximum correlation coefficient
    • Dept. Statistics, Aug.
    • W. Bryc, A. Dembo, and A. Kagan, "On the maximum correlation coefficient," Dept. Statistics, Stanford Univ., Tech. Rep. 2002-25, Aug. 2002.
    • (2002) Stanford Univ., Tech. Rep. , vol.2002 , Issue.25
    • Bryc, W.1    Dembo, A.2    Kagan, A.3
  • 10
    • 84957079591 scopus 로고    scopus 로고
    • Toward sound approaches to counteract power-analysis attacks
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • S. Chari, C. Jutla, J. Rao, and P. Rohatgi, "Toward sound approaches to counteract power-analysis attacks," in Advances in Cryptology - CRYPTO 1999. Heidelberg, Germany: Springer-Verlag, 1999, vol. 1666, Lecture Notes in Computer Science, pp. 398-412.
    • (1999) Advances in Cryptology - CRYPTO 1999 , vol.1666 , pp. 398-412
    • Chari, S.1    Jutla, C.2    Rao, J.3    Rohatgi, P.4
  • 11
    • 35248899532 scopus 로고    scopus 로고
    • Template attacks
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • S. Chari, J. Rao, and P. Rohatgi, "Template attacks," in Cryptographic Hardware and Embedded Systems - CHES 2002. Heidelberg, Germany: Springer-Verlag, 2002, vol. 2523, Lecture Notes in Computer Science, pp. 13-28.
    • (2002) Cryptographic Hardware and Embedded Systems - CHES 2002 , vol.2523 , pp. 13-28
    • Chari, S.1    Rao, J.2    Rohatgi, P.3
  • 12
    • 68549099548 scopus 로고    scopus 로고
    • Differential power analysis in the presence of hardware countermeasures
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • C. Clavier, J. S. Coron, and N. Dabbous, "Differential power analysis in the presence of hardware countermeasures," in Cryptographic Hardware and Embedded Systems - CHES 2000. Heidelberg, Germany: Springer-Verlag, 2000, vol. 1965, Lecture Notes in Computer Science, pp. 252-263.
    • (2000) Cryptographic Hardware and Embedded Systems - CHES 2000 , vol.1965 , pp. 252-263
    • Clavier, C.1    Coron, J.S.2    Dabbous, N.3
  • 13
    • 23044528645 scopus 로고    scopus 로고
    • Statistics and secret leakage
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • J. S. Coron, P. Kocher, and D. Naccache, "Statistics and secret leakage," in Engineering Societies in the Agents World. Heidelberg, Germany: Springer-Verlag, 2000, vol. 1972, Lecture Notes in Computer Science, pp. 157-173.
    • (2000) Engineering Societies in the Agents World , vol.1972 , pp. 157-173
    • Coron, J.S.1    Kocher, P.2    Naccache, D.3
  • 15
    • 84949520149 scopus 로고    scopus 로고
    • DES and differential power analysis
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • L. Goubin and J. Patarin, "DES and differential power analysis," in Cryptographic Hardware and Embedded Systems - CHES 1999. Heidelberg, Germany: Springer-Verlag, 1999, vol. 1717, Lecture Notes in Computer Science, pp. 158-172.
    • (1999) Cryptographic Hardware and Embedded Systems - CHES 1999 , vol.1717 , pp. 158-172
    • Goubin, L.1    Patarin, J.2
  • 17
    • 35248877672 scopus 로고    scopus 로고
    • Randomized signed-scalar multiplication of ECC to resist power attacks
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • J.-C. Ha and S.-J. Moon, "Randomized signed-scalar multiplication of ECC to resist power attacks," in Cryptographic Hardware and Embedded Systems - CHES 2002. Heidelberg, Germany: Springer-Verlag, 2002, vol. 2523, Lecture Notes in Computer Science, pp. 551-563.
    • (2002) Cryptographic Hardware and Embedded Systems - CHES 2002 , vol.2523 , pp. 551-563
    • Ha, J.-C.1    Moon, S.-J.2
  • 19
    • 35248868313 scopus 로고    scopus 로고
    • Hidden Markov model cryptanalysis
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • C. Karlof and D. Wagner, "Hidden Markov model cryptanalysis," in Cryptographic Hardware and Embedded Systems - CHES 2003. Heidelberg, Germany: Springer-Verlag, 2003, vol. 2779, Lecture Notes in Computer Science, pp. 17-30.
    • (2003) Cryptographic Hardware and Embedded Systems - CHES 2003 , vol.2779 , pp. 17-30
    • Karlof, C.1    Wagner, D.2
  • 20
    • 0000474763 scopus 로고    scopus 로고
    • Differential power analysis
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in Advances in Cryptology - CRYPTO 99. Heidelberg, Germany: Springer-Verlag, 1999, vol. 1666, Lecture Notes in Computer Science, pp. 398-412.
    • (1999) Advances in Cryptology - CRYPTO 99 , vol.1666 , pp. 398-412
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 22
    • 24144470308 scopus 로고    scopus 로고
    • Hardware countermeasures against DPA - A statistical analysis of their effectiveness
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • S. Mangard, "Hardware countermeasures against DPA - a statistical analysis of their effectiveness," in Topics in Cryptology - CT-RSA 2005. Heidelberg, Germany: Springer-Verlag, 2005, vol. 3376, Lecture Notes in Computer Science, pp. 222-235.
    • (2005) Topics in Cryptology - CT-RSA 2005 , vol.3376 , pp. 222-235
    • Mangard, S.1
  • 23
    • 31344450795 scopus 로고    scopus 로고
    • Side-channel leakage of masked CMOS gates
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • _, "Side-channel leakage of masked CMOS gates," in Topics in Cryptology - CT-RSA 2004. Heidelberg, Germany: Springer-Verlag, 2004, vol. 2964, Lecture Notes in Computer Science, pp. 351-365.
    • (2004) Topics in Cryptology - CT-RSA 2004 , vol.2964 , pp. 351-365
  • 24
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for des cipher
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • M. Matsui, "Linear cryptanalysis method for DES cipher," in Advances in Cryptology - EUROCRYPT 1993. Heidelberg, Germany: Springer-Verlag, 1993, vol. 765, Lecture Notes in Computer Science, pp. 386-397.
    • (1993) Advances in Cryptology - EUROCRYPT 1993 , vol.765 , pp. 386-397
    • Matsui, M.1
  • 25
    • 84944906595 scopus 로고    scopus 로고
    • Randomized register renaming to foil DPA
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • D. May, H. Muller, and N. Smart, "Randomized register renaming to foil DPA," in Cryptographic Hardware and Embedded Systems - CHES 2001. Heidelberg, Germany: Springer-Verlag, 2001. vol. 2162, Lecture Notes in Computer Science, pp. 28-38.
    • (2001) Cryptographic Hardware and Embedded Systems - CHES 2001 , vol.2162 , pp. 28-38
    • May, D.1    Muller, H.2    Smart, N.3
  • 26
    • 2642560170 scopus 로고    scopus 로고
    • Using second-order power analysis to attack DPA resistant software
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • T. S. Messerges, "Using second-order power analysis to attack DPA resistant software," in Cryptographic Hardware and Embedded Systems - CHES 2000. Heidelberg, Germany: Springer-Verlag, 2000, vol. 1965, Lecture Notes in Computer Science, pp. 71-77.
    • (2000) Cryptographic Hardware and Embedded Systems - CHES 2000 , vol.1965 , pp. 71-77
    • Messerges, T.S.1
  • 27
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • May
    • T. S. Messerges, E. A. Dabbish, and R. H. Sloan, "Examining smart-card security under the threat of power analysis attacks," IEEE Trans. Comput., vol. 51, no. 5, pp. 541-552, May 2002.
    • (2002) IEEE Trans. Comput. , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 28
    • 0003508568 scopus 로고
    • FIPS 46, National Institute of Standards and Technology, Jan.
    • Data Encryption Standard, FIPS 46, National Institute of Standards and Technology, Jan. 1977.
    • (1977) Data Encryption Standard
  • 29
    • 0003508558 scopus 로고    scopus 로고
    • FIPS 197, National Institute of Standards and Technology, Nov.
    • Advanced Encryption Standard, FIPS 197, National Institute of Standards and Technology, Nov. 2001.
    • (2001) Advanced Encryption Standard
  • 30
    • 8744295498 scopus 로고    scopus 로고
    • Power-analysis attacks on an FPGA - First experimental results
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • S. B. Ors, E. Oswald, and B. Preneel, "Power-analysis attacks on an FPGA - First experimental results," in Cryptographic Hardware and Embedded Systems - CHES 2003. Heidelberg, Germany: Springer-Verlag, 2003, vol. 2279, Lecture Notes in Computer Science, pp. 35-50.
    • (2003) Cryptographic Hardware and Embedded Systems - CHES 2003 , vol.2279 , pp. 35-50
    • Ors, S.B.1    Oswald, E.2    Preneel, B.3
  • 31
    • 3042545023 scopus 로고    scopus 로고
    • Power-analysis attack on an ASIC AES implementation
    • Las Vegas, NV
    • S. B. Ors, F. Gurkaynak, E. Oswald, and B. Preneel, "Power-analysis attack on an ASIC AES implementation," presented at the ITCC 2004, Las Vegas, NV.
    • ITCC 2004
    • Ors, S.B.1    Gurkaynak, F.2    Oswald, E.3    Preneel, B.4
  • 32
    • 84944889933 scopus 로고    scopus 로고
    • Randomized addition-substraction chains as a countermeasure against power attacks
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • E. Oswald and M. Aigner, "Randomized addition-substraction chains as a countermeasure against power attacks," in Cryptographic Hardware and Embedded Systems - CHES 2001. Heidelberg, Germany: Springer-Verlag, 2001, vol. 2162, Lecture Notes in Computer Science, pp. 39-50.
    • (2001) Cryptographic Hardware and Embedded Systems - CHES 2001 , vol.2162 , pp. 39-50
    • Oswald, E.1    Aigner, M.2
  • 33
    • 35248821853 scopus 로고    scopus 로고
    • Enhancing simple power-analysis attacks on elliptic curve cryptosystems
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • E. Oswald, "Enhancing simple power-analysis attacks on elliptic curve cryptosystems," in Cryptographic Hardware and Embedded Systems - CHES 2002. Heidelberg, Germany: Springer-Verlag, 2002. vol. 2523, Lecture Notes in Computer Science, pp. 82-97.
    • (2002) Cryptographic Hardware and Embedded Systems - CHES 2002 , vol.2523 , pp. 82-97
    • Oswald, E.1
  • 34
    • 33745823184 scopus 로고    scopus 로고
    • A side-channel analysis description of the AES S-box
    • Paris, France
    • E. Oswald, S. Mangard, N. Pramstaller, and V. Rijmen, "A side-channel analysis description of the AES S-box," presented at the FSE 2005, Paris, France.
    • FSE 2005
    • Oswald, E.1    Mangard, S.2    Pramstaller, N.3    Rijmen, V.4
  • 35
    • 27244438087 scopus 로고    scopus 로고
    • Improved higher-order side-channel attacks with FPGA experiments
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • E. Peeters, F.-X. Standaert, N. Donckers, and J.-J. Quisquater, "Improved higher-order side-channel attacks with FPGA experiments," in Cryptographic Hardware and Embedded Systems - CHES 2005. Heidelberg, Germany: Springer-Verlag, 2005, vol. 3659, Lecture Notes in Computer Science, pp. 309-323.
    • (2005) Cryptographic Hardware and Embedded Systems - CHES 2005 , vol.3659 , pp. 309-323
    • Peeters, E.1    Standaert, F.-X.2    Donckers, N.3    Quisquater, J.-J.4
  • 37
    • 24744465637 scopus 로고    scopus 로고
    • Power analysis of an FPGA implementation of Rijndael: Is pipelining a DPA countermeasure?
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • F.-X. Standaert, S. B. Ors, and B. Preneel, "Power analysis of an FPGA implementation of Rijndael: is pipelining a DPA countermeasure?," in Cryptographic Hardware and Embedded Systems - CHES 2004. Heidelberg, Germany: Springer-Verlag, 2004, vol. 3156, Lecture Notes in Computer Science, pp. 30-44.
    • (2004) Cryptographic Hardware and Embedded Systems - CHES 2004 , vol.3156 , pp. 30-44
    • Standaert, F.-X.1    Ors, S.B.2    Preneel, B.3
  • 38
    • 31344451762 scopus 로고    scopus 로고
    • Power analysis attacks against FPGA implementations of the des
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • F.-X. Standaert, S. B. Ors, J.-J. Quisquater, and B. Preneel, "Power analysis attacks against FPGA implementations of the DES," in Field Programmable Logic and Application. Heidelberg, Germany: Springer-Verlag, 2004, vol. 3203, Lecture Notes in Computer Science, pp. 84-94.
    • (2004) Field Programmable Logic and Application , vol.3203 , pp. 84-94
    • Standaert, F.-X.1    Ors, S.B.2    Quisquater, J.-J.3    Preneel, B.4
  • 39
    • 24744434942 scopus 로고    scopus 로고
    • On the masking countermeasure and higher-order power analysis attacks
    • Embedded Crypto Track, Las Vegas, NV
    • F.-X. Standaert, E. Peeters, and J.-J. Quisquater, "On the masking countermeasure and higher-order power analysis attacks," presented at the ITCC 2005, Embedded Crypto Track, Las Vegas, NV.
    • ITCC 2005
    • Standaert, F.-X.1    Peeters, E.2    Quisquater, J.-J.3
  • 41
    • 84893732023 scopus 로고    scopus 로고
    • A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards
    • K. Tiri, M. Akmal, and I. Verbauwhede, "A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards," in Proc. ESSCIRC 2002 pp. 403-406.
    • Proc. ESSCIRC 2002 , pp. 403-406
    • Tiri, K.1    Akmal, M.2    Verbauwhede, I.3
  • 43
    • 84902478964 scopus 로고    scopus 로고
    • Place and route for secure standard cell design
    • _, "Place and route for secure standard cell design," in Proc. CARDIS 2004 pp. 143-158.
    • Proc. CARDIS 2004 , pp. 143-158
  • 45
    • 35048870686 scopus 로고    scopus 로고
    • Toward efficient second-order power analysis
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • J. Waddle and D. Wagner, "Toward efficient second-order power analysis," in Cryptographic Hardware and Embedded Systems - CHES 2004. Heidelberg, Germany: Springer-Verlag, 2004, vol. 3156, Lecture Notes in Computer Science, pp. 1-15.
    • (2004) Cryptographic Hardware and Embedded Systems - CHES 2004 , vol.3156 , pp. 1-15
    • Waddle, J.1    Wagner, D.2
  • 46
    • 84944889837 scopus 로고    scopus 로고
    • MIST: An efficient, randomized exponentiation algorithm for resisting power analysis
    • Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
    • C. D. Walter, "MIST: An efficient, randomized exponentiation algorithm for resisting power analysis," in Topics in Cryptology - CT-RSA 2002. Heidelberg, Germany: Springer-Verlag, 2002, vol. 2271, Lecture Notes in Computer Science, pp. 53-66.
    • (2002) Topics in Cryptology - CT-RSA 2002 , vol.2271 , pp. 53-66
    • Walter, C.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.