Towards sound approaches to counteract power-analysis attacks.

*(English)*Zbl 0942.68045
Wiener, Michael (ed.), Advances in cryptology - CRYPTO ’99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15-19, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1666, 398-412 (1999).

Summary: Side channel cryptanalysis techniques, such as the analysis of instantaneous power consumption, have been extremely effective in attacking implementations on simple hardware platforms. There are several proposed solutions to resist these attacks, most of which are ad-hoc and can easily be rendered ineffective. A scientific approach is to create a model for the physical characteristics of the device, and then design implementations provably secure in that model, i.e., they resist generic attacks with an a priori bound on the number of experiments. The authors propose an abstract model which approximates power consumption in most devices and in particular small single-chip devices. Using this, they propose a generic technique to create provably resistant implementations for devices where the power model has reasonable properties, and a source of randomness exists. They prove a lower bound on the number of experiments required to mount statistical attacks on devices whose physical characteristics satisfy reasonable properties.

For the entire collection see [Zbl 0921.00042].

For the entire collection see [Zbl 0921.00042].