Improving first order differential power attacks through digital signal processing

  • Authors:
  • Alessandro Barenghi;Gerardo Pelosi;Yannick Teglia

  • Affiliations:
  • Politecnico di Milano, Milan, Italy;Università di Bergamo, Bergamo, Italy;STMicroelectronics, Rousset, France

  • Venue:
  • Proceedings of the 3rd international conference on Security of information and networks
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Side-channel attacks pose a critical threat to the deployment of secure embedded systems. Differential-power analysis is a technique relying on measuring the power consumption of device while it computes a cryptographic primitive, and extracting the secret information from it exploiting the knowledge of the operations involving the key. There is no open literature describing how to properly employ Digital Signal Processing (DSP) techniques in order to improve the effectiveness of the attacks. This paper presents a pre-processing technique based on DSP, reducing the number of traces needed to perform an attack by an order of magnitude with respect to the results obtained with raw datasets, and puts it into practical use attacking a commercial 32-bit software implementation of AES running on a Cortex-M3 CPU. The main contribution of this paper is proposing a leakage model for software implemented cryptographic primitives and an effective framework to extract it.