Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Differential Fault Analysis of Secret Key Cryptosystems
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Three-phase dual-rail pre-charge logic
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Successfully attacking masked AES hardware implementations
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Hi-index | 0.01 |
This paper proposes a new kind of side-channel attack where the correlation between processed data and total capacitance seen looking into the power supply pin of a cryptographic device is exploited. The attack is introduced and advantages and drawbacks with respect to the well-known power analysis are discussed. The attack implementation and experimental results attacking a static CMOS implementation of a 8051 microprocessor core are provided and a comparison between the proposed technique and power analysis is carried out. The obtained results are promising and future activities are planned to assess the performance of this new side-channel analysis when attacking secure implementations.