2014
DOI: 10.1007/978-3-662-45611-8_13
|View full text |Cite
|
Sign up to set email alerts
|

Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer

Abstract: Abstract. Following the pioneering CRYPTO '99 paper by Kocher et al. differential power analysis (DPA) was initially geared around lowcost computations performed using standard desktop equipment with minimal reliance on device-specific assumptions. In subsequent years, the scope was broadened by, e.g., making explicit use of (approximate) power models. An important practical incentive of so-doing is to reduce the data complexity of attacks, usually at the cost of increased computational complexity. It is this … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(16 citation statements)
references
References 24 publications
0
16
0
Order By: Relevance
“…Fantomas. Our attack against the implementation of Fantomas is a multi-target attack [26] because a normal attack failed to recover two bits of each attacked subkey. The multi-target attack enabled us to reveal the four key-bytes using 165 traces with 100% success rate.…”
Section: Resultsmentioning
confidence: 99%
“…Fantomas. Our attack against the implementation of Fantomas is a multi-target attack [26] because a normal attack failed to recover two bits of each attacked subkey. The multi-target attack enabled us to reveal the four key-bytes using 165 traces with 100% success rate.…”
Section: Resultsmentioning
confidence: 99%
“…With the increase number of power traces, the correct key will reach the first position. Martin et al constructed an extremely efficient algorithm that accurately computing the rank of a (known) key in the list of all keys [8]. This approach is tweaked and can be also utilised to enumerate the most likely keys in a parallel fashion.…”
Section: Related Workmentioning
confidence: 99%
“…They don't consider the relationship between the repetitions and guessing entropy. So, very different from [8], we make use of the information leaking from the guessing entropy to recover the key rather than only a kind of evaluation in this paper. Our scheme significantly improves the efficiency of CPA.…”
Section: Related Workmentioning
confidence: 99%
“…This is illustrated by recent work, e.g. [1,22] investigates the usage of graphics processing units to accelerate the computation while [20] explores the sophisticated usage of high-performance computing in this setting. Although many hardware designers and power analysis experts report whether the implementations of their techniques withstand (higher order) correlation attacks, it is often not reported how much time was required to mount such attacks.…”
Section: Introductionmentioning
confidence: 97%