2003
DOI: 10.1007/978-3-540-45234-8_68
|View full text |Cite
|
Sign up to set email alerts
|

Power Analysis of FPGAs: How Practical Is the Attack?

Abstract: Abstract. Recent developments in information technologies made the secure transmission of digital data a critical design point. Large data flows have to be exchanged securely and involve encryption rates that sometimes may require hardware implementations. Reprogrammable devices such as Field Programmable Gate Arrays are highly attractive solutions for hardware implementations of encryption algorithms and several papers underline their growing performances and flexibility for any digital processing application… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2005
2005
2021
2021

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 46 publications
(22 citation statements)
references
References 6 publications
0
22
0
Order By: Relevance
“…Power analysis attack measures power consumption of device during encryption at regions where traces of using secret key increases (Kocher et al, 1999). FPGA implementations of ECC (Örs et al, 2003), RSA, AES and DES are broken by such attacks (Standaert et al, 2003;Standaert et al, 2004a;Standaert et al, 2004b).…”
Section: Performance and Security Analysis Of Hardware Implementationsmentioning
confidence: 99%
“…Power analysis attack measures power consumption of device during encryption at regions where traces of using secret key increases (Kocher et al, 1999). FPGA implementations of ECC (Örs et al, 2003), RSA, AES and DES are broken by such attacks (Standaert et al, 2003;Standaert et al, 2004a;Standaert et al, 2004b).…”
Section: Performance and Security Analysis Of Hardware Implementationsmentioning
confidence: 99%
“…To demonstrate the applicability of the proposed TSC, we implement an entire AES cryptosystem and a TSC using the linear feedback shift register (LFSR) shown in Figure 2 on running at 50 MHz. We use a 1 Ω serial current-sensing resistor to probe the power consumption of the FPGA core, similar to the experimental setups described in [22,23]. The transient power traces are measured by an Agilent Infiniium 54832D oscilloscope.…”
Section: Tscs Based On Spread-spectrum Theorymentioning
confidence: 99%
“…In subsequent years many successful DPA attacks against cryptographic algorithms implemented in software and on ASICs were published. However, four years later the first results on successful DPA attacks against DES and RSA [3] and ECC [4] implementations on FPGAs were reported. The first design methodology to secure ASIC and FPGA implementations using DDL was published by Tiri in 2004 [5].…”
Section: Previous Workmentioning
confidence: 99%