On second-order differential power analysis

  • Authors:
  • Marc Joye;Pascal Paillier;Berry Schoenmakers

  • Affiliations:
  • CIM-PACA, Centre de Micro-électronique de Provence – George Charpak, Gardanne, France;Advanced Research and Security Centre, Gemplus S.A., Issy-les-Moulineaux, France;Dept of Mathematics and Computing Science, Eindhoven University of Technology, Eindhoven, The Netherlands

  • Venue:
  • CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Differential Power Analysis (DPA) is a powerful cryptanalytic technique aiming at extracting secret data from a cryptographic device by collecting power consumption traces and averaging over a series of acquisitions. In order to prevent the leakage, hardware designers and software programmers make use of masking techniques (a.k.a. data whitening methods). However, the resulting implementations may still succumb to second-order DPA. Several recent papers studied second-order DPA but, although the conclusions that are drawn are correct, the analysis is not. This paper fills the gap by providing an exact analysis of second-order DPA as introduced by Messerges. It also considers several generalizations, including an extended analysis in the more general Hamming-distance model.