Online citations, reference lists, and bibliographies.
Please confirm you are human
(Sign Up for free to never see this)
← Back to Search

Differential Power Analysis

Paul C. Kocher, J. Jaffe, Benjamin Jun
Published 1999 · Mathematics, Computer Science

Save to my Library
Download PDF
Analyze on Scholarcy
Share
Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. We also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
This paper references
and A
E. Biha (1993)
10.1109/40.502402
Cryptographic smart cards
D. Naccache (1996)
10.1109/CICC.1995.518152
New approaches for on-chip power switching noise reduction
C. Hough (1995)
10.1007/10721064_15
A Practical Implementation of the Timing Attack
Jean-François Dhem (1998)
ëA method for obtaining digital signatures and public-key cryptosystems
R L Rivest (1978)
TIMING ATTACK: WHAT CAN BE ACHIEVED BY A POWERFUL ADVERSARY?
Gaël Hachez (2000)
10.1145/266420.266442
Proactive public key and signature systems
A. Herzberg (1997)
Two Algorithms for Modular Exponentiation Using Nonstandard Arithmetics
V. Dimitrov (1995)
10.1007/3-540-49248-8_12
Management of Secret Keys: Dynamic Key Handling
J. Daemen (1997)
ëThe First Experimental Cryptanalysis of the Data Encryption Standard
M Matsui (1994)
Tamper resistance: a cautionary note
R. Anderson (1996)
10.1109/4.34094
A Single Chip Public Key Encryption Sub-System
P. Ivey (1988)
10.1109/SFCS.1997.646127
Optimal-resilience proactive public-key cryptosystems
Y. Frankel (1997)
10.1145/357980.358017
A method for obtaining digital signatures and public-key cryptosystems
R. Rivest (1983)
10.1016/0306-4573(85)90072-X
Cryptography: A new dimension in computer data security ? and ?. Wiley-Interscience, New York (1982). xxi + 775 pp., $43.95. ISBN 0471-04892-5.
A. Bookstein (1985)
10.1049/EL:19830303
Simplifying key management in electronic fund transfer point of sale systems
H. Beker (1983)
Implementation of bit-serial adders using robust differential logic
Magnus Karlsson (1997)
ëOn the Importance of Checking Cryptographic Protocols for Faults
D Boneh
10.1007/BFb0052259
Differential Fault Analysis of Secret Key Cryptosystems
E. Biham (1997)
10.1109/4.78245
High-performance standard cell library and modeling technique for differential advanced bipolar current tree logic
Hans J. Greub (1991)
10.1007/3-540-60865-6_46
TIGER: A Fast New Hash Function
R. Anderson (1996)
10.1109/4.658628
Noise suppression scheme for gigabit-scale and gigabyte/s data-rate LSI's
D. Takashima (1998)
10.1007/BFb0053459
Comments on Soviet Encryption Algorithm
C. Charnes (1994)
10.1007/3-540-48285-7_41
Markov Ciphers and Alternating Groups
G. Hornauer (1993)
10.1109/4.50319
Bipolar circuit elements providing self-completion-indication
T. Williams (1990)
10.1109/4.641683
A 533-MHz BiCMOS superscalar RISC microprocessor
C. Maier (1997)
10.1007/3-540-39466-4_2
Cryptology - Methods and Maxims
F. Bauer (1982)
10.1049/EL:19890785
Minimum weight modified signed-digit representations and fast exponentiation
J. Jedwab (1989)
10.1007/BFb0053453
Efficient Exponentiation using Procomputation and Vector Addition Chains
P. D. Rooij (1994)
10.1145/359168.359176
How to share a secret
A. Shamir (1979)
10.1007/3-540-60313-1_168
Efficient Dynamic-Resharing "Verifiable Secret Sharing" Against Mobile Adversary
N. Alon (1995)
10.1109/SOI.1995.526480
On-chip decoupling capacitor design to reduce switching-noise-induced instability in CMOS/SOI VLSI
L. Wang (1995)
10.1007/BF00125080
Redundant integer representations and fast exponentiation
D. Gollmann (1996)
10.1109/VLSIC.1995.520675
Substrate noise reduction using active guard band filters in mixed-signal integrated circuits
K. Makie-Fukuda (1995)
10.1007/3-540-68339-9_15
New Modular Multiplication Algorithms for Fast Modular Exponentiation
S. Hong (1996)
10.1007/BFb0054321
Strength of Two Data Encryption Standard Implementations under Timing Attacks
A. Hevia (1998)
and R
D. Boneh (1997)
10.1016/S0020-0190(98)00044-1
An Algorithm for Modular Exponentiation
V. Dimitrov (1998)
10.1007/3-540-48658-5_11
More Flexible Exponentiation with Precomputation
C. H. Lim (1994)
10.1007/3-540-46416-6_2
Markov Ciphers and Differential Cryptanalysis
X. Lai (1991)
10.1515/9783110955194.222
E. J. Will
E. Cooper (1985)
Smart cards
Jose M. Zoreda (1994)
10.1007/3-540-68697-5_9
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
Paul C. Kocher (1996)
10.1016/0166-218x(90)90038-e
A Course in Number Theory and Cryptography
N. Koblitz (1987)
10.1109/4.62139
A CMOS mainframe processor with 0.5- mu m channel length
H. Schettler (1990)
A
R. L. Rivest (1978)
Jameco Electronics, ëPC-MultiScope घpart ओ142834ङ
10.1007/BFb0052343
The Block Cipher Square
J. Daemen (1997)
10.1016/S0026-2692(98)00033-0
Differential and pass-transistor CMOS logic for high performance systems
V. Oklobdzija (1998)
Diaeerential Cryptanalysis of the Data Encryption Standard
E Biham (1993)
Timing Attacks on Implementations of Di e-Hellman, RSA, DSS, and Other Systems," Advances in Cryptology
P. Kocher (1996)
10.1145/242896.242897
Strong password-only authenticated key exchange
David P. Jablon (1996)
10.1109/12.677239
Design of Balanced and Constant Weight Codes for VLSI Systems
L. Tallini (1998)
10.1007/978-1-4757-0602-4_10
Analysis of Certain Aspects of Output Feedback Mode
R. Jueneman (1982)
10.1137/0215025
A Simple Unpredictable Pseudo-Random Number Generator
L. Blum (1986)
and M
R. Anderso (1996)
10.1016/0167-4048(90)90157-O
The threat of information theft by reception of electromagnetic radiation from RS-232 cables
P. Smulders (1990)
10.1147/rd.353.0313
Differential current switch-High performance at low power
E. Eichelberger (1991)
10.1109/CICC.1992.591337
A 1 GBIT/second GaAs DES chip
H. Eberle (1992)
Tcmos: low noise power supply technique for digital ics
J. L. G. Jiménez (1995)
10.1109/4.641685
Circuit techniques in a 266-MHz MMX-enabled processor
D. Draper (1997)
10.1007/3-540-68339-9_34
The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin
M. Bellare (1996)
10.1007/BFb0052254
Proactive RSA
Y. Frankel (1996)
10.1007/3-540-47555-9_18
Fast Exponentiation with Precomputation (Extended Abstract)
Ernest F. Brickell (1992)
Proactive secret sharing and public key cryptosystems
S. Jarecki (1995)
10.1109/82.145301
Enhancement source-coupled logic for mixed-mode VLSI circuits
M. Maleki (1992)
10.1007/BFb0053428
Optimal Asymmetric Encryption
M. Bellare (1994)
10.1007/3-540-48658-5_22
Incremental Cryptography: The Case of Hashing and Signing
M. Bellare (1994)
10.1080/0161-118291857154
Digital Signature Schemes
H. Meijer (1982)
10.1007/3-540-39757-4_37
Smart Cards and Conditional Access
L. C. Guillou (1984)
10.1007/BFb0028165
Low Cost Attacks on Tamper Resistant Devices
R. Anderson (1997)
10.1007/3-540-39757-4_34
Smart Card Applications in Security and Data Protection
Jean Goutay (1984)
10.1007/3-540-47721-7_35
Smart Card, a Highly Reliable and Portable Security Device
L. C. Guillou (1986)
10.1007/3-540-49380-8_10
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
M. Kuhn (1998)
10.1007/3-540-39118-5_18
IC-Cards in High-Security Applications
I. Schaumüller-Bichl (1987)
10.1007/978-1-4613-9314-6
Differential Cryptanalysis of the Data Encryption Standard
E. Biham (1993)
10.1109/12.247835
Constant Weight Codes for Correcting Symmetric Errors and Detecting Unidirectional Errors
Mao Chao Lin (1993)
10.1007/3-540-39805-8_23
The Chipcard: An Identification Card With Cryptographic Protection
Thomas Krivachy (1985)
10.1007/3-540-48658-5_1
The First Experimental Cryptanalysis of the Data Encryption Standard
M. Matsui (1994)
10.1023/A:1008255029409
di/dt Noise in CMOS Integrated Circuits
P. Larsson (1997)
10.1016/0167-4048(87)90024-1
Tempest over leaking computers
H. Highland (1987)
10.1007/3-540-46877-3_33
A Provably-Secure Strongly-Randomized Cipher
U. Maurer (1990)
10.1007/3-540-69053-0_4
On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract)
D. Boneh (1997)
10.1201/9781439821916
Handbook of Applied Cryptography
A. Menezes (1996)
10.1080/00207169108804009
High-radix and bit recoding techniques for modular exponentiation
Ç. K. Koç (1991)
Security for computer networks - an introduction to data security in teleprocessing and electronic funds transfer (2. ed.)
D. Davies (1989)



This paper is referenced by
10.1109/TCSI.2015.2452371
Data-Dependent Delays as a Barrier Against Power Attacks
I. Levi (2015)
10.1109/SPW.2015.33
The Correctness-Security Gap in Compiler Optimization
Vijay D'Silva (2015)
10.1109/TVLSI.2014.2320154
Randomized Multitopology Logic Against Differential Power Analysis
M. Avital (2015)
10.1109/JETCAS.2014.2372431
Reconfiguration-Based VLSI Design for Security
Bao Liu (2015)
10.1007/978-3-030-63083-6_22
An Efficient Side Channel Attack Technique with Improved Correlation Power Analysis
Ngoc-Tuan Do (2020)
10.1007/s13389-014-0089-3
A machine learning approach against a masked AES
L. Lerman (2014)
10.1109/ISESD.2016.7886757
DPA-countermeasure with knowledge growing system
Septafiansyah Dwi Putra (2016)
10.1007/978-3-319-50057-7_8
Physical Unclonable Functions and Intellectual Property Protection Techniques
R. Karri (2017)
10.1002/sec.1580
Leakage-resilient ID-based signature scheme in the generic bilinear group model
Jui-Di Wu (2016)
10.1007/978-3-319-39555-5_29
Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice
A. Biryukov (2016)
10.1007/S42835-019-00226-6
Securing the AES Cryptographic Circuit Against Both Power and Fault Attacks
Jinbao Zhang (2019)
10.1007/s13389-017-0172-7
Template attack versus Bayes classifier
S. Picek (2017)
10.1109/SP.2017.14
IoT Goes Nuclear: Creating a Zigbee Chain Reaction
E. Ronen (2018)
10.1109/ISED.2017.8303906
Security of autonomous vehicle as a cyber-physical system
A. Chattopadhyay (2017)
10.1007/978-981-15-7984-4_11
Research on Online Leakage Assessment
Zhengguang Shi (2020)
10.1109/AICCSA.2009.5069373
Attacks and improvement of “security enhancement for a dynamic id-based remote user authentication scheme”
Omar Cheikhrouhou (2009)
10.1016/j.micpro.2009.06.002
Security extensions for integrity and confidentiality in embedded processors
Austin Rogers (2009)
10.1007/978-3-642-04138-9_32
Differential Fault Analysis on DES Middle Rounds
Matthieu Rivain (2009)
10.1109/TSP.2013.6614034
Robust secure charge-sharing symmetric adiabatic logic against side-channel attacks
C. Monteiro (2013)
10.1007/978-3-540-72163-5_19
Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices
D. Han (2007)
10.1007/s41635-018-0036-3
Development and Evaluation of Hardware Obfuscation Benchmarks
Sarah Amir (2018)
10.1109/EWDTS.2017.8110037
Evaluation of resistance of ECC designs protected by different randomization countermeasures against horizontal DPA attacks
I. Kabin (2017)
10.5815/IJCNIS.2013.03.03
A Comparative Study of Power Consumption Models for CPA Attack
H. Mestiri (2012)
10.1109/CANDARW.2019.00073
ECC Atomic Block against Strong Side-Channel Attacks Using Binary Curves
Yusuke Takemura (2019)
10.1109/ASYNC.2003.1199180
An investigation into the security of self-timed circuits
Z. Yu (2003)
On the selective opening security of public-key encryption
F. Heuer (2017)
Inferring TV Content from Electrical Noise
M. Enev (2010)
10.14722/ndss.2021.23137
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers
Madura A Shelton (2019)
Detecting Side Channels at the ISA Level with Static Analysis Techniques
Raymond Chee (2018)
10.1007/s12652-017-0516-2
Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems
Qi Jiang (2018)
10.1007/978-3-319-66402-6_25
AVR Processors as a Platform for Language-Based Security
Florian Dewald (2017)
10.1007/978-3-642-41224-0
Security, Privacy, and Applied Cryptography Engineering
Benedikt Gierlichs (2013)
See more
Semantic Scholar Logo Some data provided by SemanticScholar