Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
The Twofish encryption algorithm: a 128-bit block cipher
The Twofish encryption algorithm: a 128-bit block cipher
The Design of Rijndael
Differential Cryptanalysis of DES-like Cryptosystems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Algorithm Design and Side Channel Vulnerability on the Example of DPA Attack
ICN '07 Proceedings of the Sixth International Conference on Networking
Investigations of power analysis attacks on smartcards
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Hi-index | 0.00 |
This paper analyzes the design of cryptograpbic algorithm and the effect of their vulnerability towards statistical side channel attacks. On the example of the DPA attack by Kocher the complexity of the statistical side channel attacks and their dependency on algorithmic parameters is shown. In particular key dependent operation are considered and their effect is illustrated on the example of the block cipher algorithm AES and Twofish. It is shown that the careful selection or design of algorithms can increase the security of implementations of algorithms in addition to and independent from conventional DPA attack countenneasures.