A Study on the Experimental Methods of the Power Analysis Attack in a Smartcard

스마트카드의 전력분석공격 실험 방법에 관한 연구

  • 이훈재 (동서대학교 인터넷공학부) ;
  • 장익훈 (경운대학교 컴퓨터전자정보공학부) ;
  • 최희봉 (국가보안기술연구소) ;
  • 박일환 (국가보안기술연구소)
  • Published : 2002.06.01

Abstract

Attacks have been proposed that use side information as timing measurements, power consumption, electromagnetic emissions and faulty hardware. Elimination side-channel information or prevention it from being used to attack a secure system is an tractive ares of research. In this paper, differential power analysis techniques to attack the DES are experimented and analyzed. And we propose the prevention of DPA attack by software implementation technique.

최근에 시간측정, 전력소모측정, 전자기파 방사측정 및 하드웨어적 강제에러주입 등의 부가정보를 사용한 공격 기법들이 연구되어지고 있다. 또한 부채널 정보를 줄이거나 측면공격으로부터 방어하는 기술들이 연구되고 있다. 본 논문에서는 차분전력분석 기법으로 DES 암호 알고리즘 공격에 대하여 실험·분석하였다. 그리고 DES 형태의 DPA 공격에 강한 소프트웨어 구현시의 방어대책을 제안하였다.

Keywords

References

  1. Proceedings of ESORICS'98 Side Channel Cryptanalysis of Product Cipher John Kelsey;Bruce Schneier;David Wagner;Chris Hall
  2. Side Channel Cryptanalysis of Product Cipher (final version) John Kelsey;Bruce Schneier;David Wagner;Chris Hall
  3. Proceedings of Advances in Cryptology-CRYPTO'99 Differential Power Analysis P. Kocker;J. Jaffe;B. Jun
  4. Introduction to Differential Power Analysis and Related Attacks P. Kocher;J. Jaffe;B. Jun
  5. Proceedings of USENIX Workshop on Smartcard Technology Investigations of Power Analysis Attacks on Smartcards Thomas S. Messerges;Ezzy A. Dabbish;Robert H Sloan
  6. Proceedings of Advances in Cryptology-CRYPTO'99 Towards Sound Approaches to Counteract Power-Analysis Attacks S. Chari,;C.Jutla;J. Rao;P. Rohatgi
  7. 2nd AES conference Power Analysis of the Key Scheduling of the AES Candidates E. Biham;A. Shamir
  8. CHES'99 Power analysis attacks of modular exponentiation in smartcards T.S. Messerges;E.A. Dabbish;R.H. Sloan
  9. CHES'99 DES and differential power analysis L. Goubin;J. Patarin
  10. CHES'99 IPA: A new class of power attacks P. Fahn;P. Pearson
  11. CHES'2000 Using Second-Order Power Analysis to Attack DPA Resistant Software T.S. Messerges