Differential power analysis - resistant cryptographic processing

作者: Joshua M. Jaffe , Benjamin C. Jun , Paul C. Kocher

DOI:

关键词:

摘要: Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or secret data. A data collection analysis system is configured with an analog-to-digital converter connected measure the device's consumption of electrical power, some property target device, that varies during processing. As device performs operations, A/D are recorded for each operation. The stored then processed using statistical analysis, yielding entire key, partial information about key used accelerate a brute force search attack.

参考文章(323)
Mike Burmester, Yvo Desmedt, A secure and efficient conference key distribution system theory and application of cryptographic techniques. pp. 275- 286 ,(1994) , 10.1007/BFB0053443
Seong-Min Hong, Sang-Yeop Oh, Hyunsoo Yoon, New modular multiplication algorithms for fast modular exponentiation theory and application of cryptographic techniques. pp. 166- 177 ,(1996) , 10.1007/3-540-68339-9_15
David W. Hall, Arecio A. Hernandez, J. G. Dooley, Low noise logic family ,(1994)
Ernst Bovelander, Smart Card Security ‘How Can We Be So Sure?’ Lecture Notes in Computer Science. pp. 332- 337 ,(1998) , 10.1007/3-540-49248-8_15
Mark Vesterbacka, Lars Wanhammar, Magnus Karlsson, Implementation of bit-serial adders using robust differential logic pp. 366- 373 ,(1997)
Gray Frank, Pulse code communication ,(1947)