Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Security implications of simultaneous dynamic and leakage power analysis attacks on nanoscale cryptographic circuits

The implications of simultaneous differential power analysis (DPA) and leakage power analysis (LPA) attacks are investigated on nanoscale cryptographic circuits which employ dynamic voltage scaling (DVS) or aggressive voltage scaling techniques. As compared with individually performing a DPA or an LPA attack on the corresponding cryptographic circuits, the number of required plaintexts to disclose the key with a 0.9 success rate reduces by 93.5% (as compared with DPA attacks) and 93.06% (as compared with LPA attacks), respectively, when the variance of supply voltage is 0.0833 V 2.

References

    1. 1)
    2. 2)
      • 8. Morsin, M.-B., Amriey, M.-K.: ‘Designing and characterization of 60 nm p-well MOSFET using sentaurus TCAD software’. Proc. ICECT, May 2010, pp. 169172.
    3. 3)
      • 3. Baddam, K., Zwolinski, M.: ‘Evaluation of dynamic voltage and frequency scaling as a differential power analysis attacks’. Proc. VLSI Design, January 2007, pp. 854862.
    4. 4)
    5. 5)
    6. 6)
      • 5. Yang, S., Wolf, W., Vijaykrishnan, N., Serpanos, D.-N., Xie, Y.: ‘Power attack resistant cryptosystem design: a dynamic voltage and frequency switching approach’. Proc. Design, Automation and Test in Europe, March 2005, pp. 6469.
    7. 7)
      • 1. Mangard, S., Oswald, E., Popp, T.: ‘Power analysis attacks revealing the secrets of smart cards (advances in information security)’ (Springer, New York, 2007).
    8. 8)
http://iet.metastore.ingenta.com/content/journals/10.1049/el.2015.2835
Loading

Related content

content/journals/10.1049/el.2015.2835
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
Correspondence
This article has following corresponding article(s):
interview
This is a required field
Please enter a valid email address