Skip to main content

Correlation Power Analysis Based on Switching Glitch Model

  • Conference paper
Information Security Applications (WISA 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6513))

Included in the following conference series:

Abstract

Power analysis attacks are based on analyzing the power consumption of the cryptographic devices while they perform the encryption operation. Correlation Power Analysis (CPA) attacks exploit the linear relation between the known power consumption and the predicted power consumption of cryptographic devices to recover keys. It has been one of the effective side channel attacks that threaten the security of CMOS circuits. However, few works consider the leakage of glitches at the logic gates. In this paper, we present a new power consumption model, namely Switching Glitch (SG) model, which not only considers the data dependent switching activities but also including glitch power consumptions in CMOS circuits. Additionally, from a theoretical point of view, we show how to estimate the glitch factor. The experiments against AES implementation validate the proposed model. Compared with CPA based on Hamming Distance model, the power traces of recovering keys have been decreased by as much as 28.9%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  2. Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Le, T., Clédière, J., Canovas, C., et al.: A proposition for correlation power analysis enhancement. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, p. 174. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Katashita, T., Satoh, A., Sugawara, T., et al.: Enhanced Correlation Power Analysis Using Key Screening Technique. In: Proceedings of Reconfigurable Computing and FPGAs (ReConFig 2008), December 3-5, pp. 403–408 (2008)

    Google Scholar 

  5. Peeters, E., Standaert, F.X., Quisquater, J.J.: Power and electromagnetic analysis: Improved model, consequences and comparisons. Integration, the VLSI Journal 40(1), 52–60 (2007)

    Article  Google Scholar 

  6. National Institute of Standards and Technology (NIST) of U.S. Department of Commerce: FIPS 197: Advanced Encryption Standard (2001)

    Google Scholar 

  7. Mangard, S.: A simple power analysis attack on implementation of the AES expansion. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 343–358. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  8. Ors, S.B., Gurkaynak, F., Oswald, E., et al.: Power-Analysis Attack on an ASIC AES implementation. In: Proceedings of ITCC 2004, Las Vegas, April 5-7 (2004)

    Google Scholar 

  9. Lu, Y., Agrawal, V.D.: CMOS Leakage and Glitch Minimization for Power-Performance Tradeoff. Journal of Low Power Electronics 2(3), 1–10 (2006)

    Article  Google Scholar 

  10. Raghunathan, A., Dey, S., Jha, N.K.: High-level macro-modeling and estimation techniques for switching activity and power consumption. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 11(4), 538–557 (2003)

    Article  Google Scholar 

  11. Mangard, S., Popp, T., Gammel, B.M.: Side-channel Leakage of Masked CMOS Gates. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 351–365. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  12. Mangard, S., Schramm, K.: Pinpointing the side-channel leakage of masked AES hardware implementations. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 76–90. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Saeki, M., Suzuki, D., Ichikawa, T.: Leakage analysis of DPA Countermeasures at the Logic Level. IEICE transactions on fundamentals of electronics, communications and computer sciences E90-A(1), 169–178 (2007)

    Article  Google Scholar 

  14. Suzuki, D., Saeki, M., Ichikawa, T.: Random Switching Logic: A New Countermeasure against DPA and Second-Order DPA at the Logic Level. IEICE transactions on fundamentals of electronics, communications and computer sciences E90-A(1), 160–168 (2007)

    Article  Google Scholar 

  15. Najm, F.N.: Power estimation techniques for integrated circuits. In: Proceedings of the International Conference on Computer-Aided Design, California, United States, pp. 492–499 (1995)

    Google Scholar 

  16. Liu, X., Papaefthymiou, M.C.: A statistical model of input glitch propagation and its application in power macromodeling. Journal of Power 10, 10

    Google Scholar 

  17. Liu, X., Papaefthymiou, M.C.: Incorporation of input glitches into power macromodeling. In: Proceedings of IEEE International Symposium on Circuits and Systems (2002)

    Google Scholar 

  18. Chari, S., Jutla, C.S., Rao, J.R., et al.: Towards sound approaches to counteract power analysis attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398–412. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  19. Research Center for Information Security (RCIS) of AIST: Side-channel Attack Standard Evaluation Board (SASEBO), http://www.rcis.aist.go.jp/special/SASEBO/index-en.html

  20. Computer Structures Laboratory of Tohoku University.: Cryptographic Hardware Project, http://www.aoki.ecei.tohoku.ac.jp/crypto

  21. Qian, G., Zhou, Y., Xing, Y., et al.: A Weighted Statistical Analysis of DPA Attack on an ASIC AES Implementation. In: Proceedings of IEEE 8th International Conference on ASIC (ASICON 2009), Changsha, China, October 20-23 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, H., Qian, G., Goto, S., Tsunoo, Y. (2011). Correlation Power Analysis Based on Switching Glitch Model. In: Chung, Y., Yung, M. (eds) Information Security Applications. WISA 2010. Lecture Notes in Computer Science, vol 6513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17955-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17955-6_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17954-9

  • Online ISBN: 978-3-642-17955-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics