Treffer: Power analysis attacks against FPGA implementations of the DES

Title:
Power analysis attacks against FPGA implementations of the DES
Source:
FPL 2004 : field-programmable logic and applications (Antwerp, 30 August - 1 September 2004)Lecture notes in computer science. :84-94
Publisher Information:
Berlin: Springer, 2004.
Publication Year:
2004
Physical Description:
print, 12 ref
Original Material:
INIST-CNRS
Subject Terms:
Computer science, Informatique, Mathematics, Mathématiques, Sciences exactes et technologie, Exact sciences and technology, Sciences appliquees, Applied sciences, Informatique; automatique theorique; systemes, Computer science; control theory; systems, Logiciel, Software, Traitement des langages et microprogrammation, Language processing and microprogramming, Electronique, Electronics, Electronique des semiconducteurs. Microélectronique. Optoélectronique. Dispositifs à l'état solide, Semiconductor electronics. Microelectronics. Optoelectronics. Solid state devices, Circuits intégrés, Integrated circuits, Circuits intégrés par fonction (dont mémoires et processeurs), Integrated circuits by function (including memories and processors), Analyse énergétique, Energy analysis, Análisis energético, Architecture reconfigurable, Reconfigurable architectures, Carte à puce, Smart cards, Conception circuit, Circuit design, Diseño circuito, Consommation énergie électrique, Power consumption, Consommation énergie, Energy consumption, Consumo energía, Cryptage, Encryption, Cifrado, Cryptanalyse, Cryptanalysis, Criptoanálisis, Cryptographie, Cryptography, Criptografía, Dispositif puissance, Power device, Dispositivo potencia, Fuite, Leak, Salida, Monitorage, Monitoring, Monitoreo, Réseau porte programmable, Field programmable gate array, Red puerta programable, Surveillance, Vigilancia, Sécurité, Safety, Seguridad, Vulnérabilité, Vulnerability, Vulnerabilidad, Attaque, Attacking, Ataque
Document Type:
Konferenz Conference Paper
File Description:
text
Language:
English
Author Affiliations:
UCL Crypto Croup, Laboratoire de Microélectronique, Université Catholique de Louvain, Place du Levant, 3, 1348 Louvain-La-Neuve, Belgium
Katholieke Universiteit Leuven, Dept.ESAT/SCD-COSIC, Kasteelpark Arenberg 10, 3001 Leuven-Heverlee, Belgium
ISSN:
0302-9743
Rights:
Copyright 2004 INIST-CNRS
CC BY 4.0
Sauf mention contraire ci-dessus, le contenu de cette notice bibliographique peut être utilisé dans le cadre d’une licence CC BY 4.0 Inist-CNRS / Unless otherwise stated above, the content of this bibliographic record may be used under a CC BY 4.0 licence by Inist-CNRS / A menos que se haya señalado antes, el contenido de este registro bibliográfico puede ser utilizado al amparo de una licencia CC BY 4.0 Inist-CNRS
Notes:
Computer science; theoretical automation; systems

Electronics
Accession Number:
edscal.16107513
Database:
PASCAL Archive

Weitere Informationen

Cryptosystem designers frequently assume that secret parameters will be manipulated in tamper resistant environments. However, physical implementations can be extremely difficult to control and may result in the unintended leakage of side-channel information. In power analysis attacks, it is assumed that the power consumption is correlated to the data that is being processed. An attacker may therefore recover secret information by simply monitoring the power consumption of a device. Several articles have investigated power attacks in the context of smart card implementations. While FPGAs are becoming increasingly popular for cryptographic applications, there are only a few articles that assess their vulnerability to physical attacks. In this article, we demonstrate the specific properties of FPGAs w.r.t. Differential Power Analysis (DPA). First we emphasize that the original attack by Kocher et al. and the improvements by Brier et al. do not apply directly to FPGAs because their physical behavior differs substantially from that of smart cards. Then we generalize the DPA attack to FPGAs and provide strong evidence that FPGA implementations of the Data Encryption Standard (DES) are vulnerable to such attacks.