A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit

  • Authors:
  • Jeahoon Park;Hoonjae Lee;Jaecheol Ha;Yongje Choi;Howon Kim;Sangjae Moon

  • Affiliations:
  • School of Electrical Engineering & Computer Science, Kyungpook National Univ., Korea;School of Electrical Engineering & Computer Science, Dongseo Univ., Korea;Division of Information Science, Korea Nazarene Univ., Korea;ETRI Researcher,;ETRI Researcher,;School of Electrical Engineering & Computer Science, Kyungpook National Univ., Korea

  • Venue:
  • Computational Intelligence and Security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Power analysis attack, which was introduced by Kocher et al. in 1999, was known as the most threatening physical attack against low power device such as smart-card. The essential reason that allows an attacker to implement a power analysis attack on a cryptosystem is leakage information, which is leaked during the operation of the cryptosystem茂戮驴s encryption/decryption process and related to internal secret information. The general and efficient power analysis attack method proposed in this paper is based on an internally divided operation unit. As such, the proposed power analysis attack is implemented to expose the weakness of the operation of a symmetric key encryption algorithm in a smart-card.