Examining smart-card security under the threat of power analysis attacks
Top Cited Papers
- 7 August 2002
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Computers
- Vol. 51 (5), 541-552
- https://doi.org/10.1109/tc.2002.1004593
Abstract
This paper examines how monitoring power consumption signals might breach smart-card security. Both simple power analysis and differential power analysis attacks are investigated. The theory behind these attacks is reviewed. Then, we concentrate on showing how power analysis theory can be applied to attack an actual smart card. We examine the noise characteristics of the power signals and develop an approach to model the signal-to-noise ratio (SNR). We show how this SNR can be significantly improved using a multiple-bit attack. Experimental results against a smart-card implementation of the Data Encryption Standard demonstrate the effectiveness of our multiple-bit attack. Potential countermeasures to these attacks are also discussed.Keywords
This publication has 15 references indexed in Scilit:
- Differential Cryptanalysis of the Full 16-round DESPublished by Springer Nature ,2001
- Differential Power AnalysisLecture Notes in Computer Science, 1999
- DES and Differential Power Analysis The “Duplication” MethodLecture Notes in Computer Science, 1999
- Side channel cryptanalysis of product ciphersLecture Notes in Computer Science, 1998
- Java card: Internet computing on a smart cardIEEE Internet Computing, 1997
- Cryptographic smart cardsIEEE Micro, 1996
- Linear Cryptanalysis Method for DES CipherLecture Notes in Computer Science, 1994
- Differential cryptanalysis of DES-like cryptosystemsJournal of Cryptology, 1991
- Electromagnetic radiation from video display units: An eavesdropping risk?Computers & Security, 1985
- The Fundamental Physical Limits of ComputationScientific American, 1985