Novel countermeasures and techniques for differential power analysis
Novel countermeasures and techniques for differential power analysis
Research in the last few years has indicated that, despite modern algorithms being secure against all published mathematical attacks and being far too complex to break by brute force, secret key data can be gathered by monitoring the power consumption. This is known as a power analysis attack, the most successful has been differential power analysis (DPA). Several countermeasures have been proposed for preventing power analysis attacks with varying degrees of efficacy. One thing all the countermeasures have in common is their large cost in terms of performance and or cost. In this thesis several modifications to the AES algorithm are proposed that seek to inherently secure it against DPA and their effectiveness and cost are investigated.
Due to the statistical nature of DPA there is no set amount of power consumption data that will always give the correct result for a given device, rather, a value for the SNR and the number of power measurements involved in the attack will equate to a probability of success. In this thesis a statistical model of the DPA attack is derived and it is used to find a method for calculating the probability that a particular attack will be successful.
A more benign use for DPA is also discussed. If the signature of a specific pattern of register transitions can be detected in the power consumption of a device then designers can add hardware whose sole purpose is to be detectable in a power trace and act as a watermark to prove the presence of intellectual property.
Goodwin, John
6d699cee-2e35-4a8d-af05-f49d5656f7f1
August 2009
Goodwin, John
6d699cee-2e35-4a8d-af05-f49d5656f7f1
Wilson, Peter
8a65c092-c197-4f43-b8fc-e12977783cb3
Goodwin, John
(2009)
Novel countermeasures and techniques for differential power analysis.
University of Southampton, School of Electronics and Computer Science, Doctoral Thesis, 222pp.
Record type:
Thesis
(Doctoral)
Abstract
Research in the last few years has indicated that, despite modern algorithms being secure against all published mathematical attacks and being far too complex to break by brute force, secret key data can be gathered by monitoring the power consumption. This is known as a power analysis attack, the most successful has been differential power analysis (DPA). Several countermeasures have been proposed for preventing power analysis attacks with varying degrees of efficacy. One thing all the countermeasures have in common is their large cost in terms of performance and or cost. In this thesis several modifications to the AES algorithm are proposed that seek to inherently secure it against DPA and their effectiveness and cost are investigated.
Due to the statistical nature of DPA there is no set amount of power consumption data that will always give the correct result for a given device, rather, a value for the SNR and the number of power measurements involved in the attack will equate to a probability of success. In this thesis a statistical model of the DPA attack is derived and it is used to find a method for calculating the probability that a particular attack will be successful.
A more benign use for DPA is also discussed. If the signature of a specific pattern of register transitions can be detected in the power consumption of a device then designers can add hardware whose sole purpose is to be detectable in a power trace and act as a watermark to prove the presence of intellectual property.
Text
John_Goodwin_-_Thesis.pdf
- Other
More information
Published date: August 2009
Organisations:
University of Southampton
Identifiers
Local EPrints ID: 72692
URI: http://eprints.soton.ac.uk/id/eprint/72692
PURE UUID: 3be9690e-df00-43a1-8952-0a038c15e5ab
Catalogue record
Date deposited: 24 Feb 2010
Last modified: 13 Mar 2024 21:38
Export record
Contributors
Author:
John Goodwin
Thesis advisor:
Peter Wilson
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics