Secure DES Implementation Against High-Order Differential Power Analysis

نویسنده

  • Louiza Papachristodoulou
چکیده

Differential Power Analysis (DPA) is a powerful cryptanalytic technique for extracting data from a cryptographic device. The implementation of DPA relies mainly on collecting power consumption traces and applying statistical methods, in order to average over them and obtain the secret key. Information leakage of this kind can be prevented by using masking methods. However, most of these methods are efficient only in preventing first-order DPA attacks and they fail to defense against High-Order DPA (HODPA) attacks, even of second-order. This paper presents an overview of High-Order DPA attacks focusing mainly on DES algorithm, which is still vulnerable to this kind of attacks. After analyzing the Unique Masking Method, introduced by Akkar and Goubin, and its weak points, we describe an enhancement of this implementation, which requires three random 32-bit masks and six S-boxes, in order to secure the outputs against any order DPA type attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On two DES implementations secure against differential power analysis in smart-cards

Masking is one of the efficient and easily implemented countermeasures to protect cryptographic algorithms in such resource limited environments as smart-cards from differential power analysis as well as simple power analysis that were first introduced by Kocher et al. in 1999. To defend differential power analysis attacks, Akkar and Giraud presented a Transformed Masking Method and applied it ...

متن کامل

Enhanced DES Implementation Secure Against High-Order Differential Power Analysis in Smartcards

Since Differential Power Analysis (DPA) on DES in smartcards was firstly published by Kocher et al. in 1999, many countermeasures have been proposed to protect cryptographic algorithms from the attack, of which masking is an efficient and easily implemented method. In this paper, after showing some attacks on Akkar et al. ’s improved DES implementation from FSE’04, we list and prove some basic ...

متن کامل

A Generic Protection against High-Order Differential Power Analysis

Di erential Power Analysis (DPA) on smart-cards was introduced by Paul Kocher [11] in 1998. Since, many countermeasures have been introduced to protect cryptographic algorithms from DPA attacks. Unfortunately these features are known not to be e cient against high order DPA (even of second order). In these paper we will rst describe new specialized rst order attack and remind how are working hi...

متن کامل

Threshold Implementation as a Countermeasure against Power Analysis Attacks

One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...

متن کامل

Two Power Analysis Attacks against One-Mask Methods

In order to protect a cryptographic algorithm against Power Analysis attacks, a well-known method consists in hiding all the internal data with randomly chosen masks. Following this idea, an AES implementation can be protected against Differential Power Analysis (DPA) by the “Transformed Masking Method”, proposed by Akkar and Giraud at CHES’2001, requiring two distinct masks. At CHES’2002, Tric...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009