|
|
Research of Differential Power Analysis Countermeasures |
Wang Peng-jun Zhang Yue-jun Zhang Xue-long |
Institute of Circuits and Systems, Ningbo University, Ningbo 315211, China |
|
|
Abstract Differential Power Analysis (DPA) attacks exploit the data or instruction dependency of the power consumption of the cryptographic devices during encryption/decryption process. A large number of power traces are used to analyze the cipher key information on mathematics statistical methods. DPA attacks have been becoming a great threat to cipher security. In order to systematically and comprehensively understand DPA countermeasures, and actively promote the studying of high performance cryptographic chip, this paper introduces the basic principle of DPA, explains and analyzes the mainstream DPA countermeasures, and points out the advanced topics countermeasures. This paper focuses on the theory of DPA countermeasures, the flow path of algorithm, and the implementation of circuits, including masking technology, hiding technology, power disruption technology and so on. The advantages and disadvantages of these countermeasures are detailed discussed. Finally, the potential research directions and advanced topics on DPA countermeasures are provided.
|
Received: 11 May 2012
|
|
Corresponding Authors:
Wang Peng-jun
E-mail: wangpengjun@nbu.edu.cn
|
|
|
|
|
|
|