A Weighted Statistical Analysis of DPA Attack on an ASIC AES Implementation
Research on Differential Power Analysis(DPA) is becoming more and more popular nowadays. Against different hardware,DPA attack will lead to different results, e.g. Attack on FPGA is easy but on ASIC is relatively difficult. However,how could we draw the conclusion that we finish a successful attack? How to build the connection between result data and successful rate is a meaningful topic.Same data with different statistical processing method will lead to different results.In this paper,we focus on DPA attack against an ASIC implementation.We analyzed two current statistical methods, pointed out the limitations. Then,we proposed a weighted statistical analysis method. According to number of traces and repetitions,we adjust the weight value.Finally,we improved the accuracy and efficiency of DPA attack on ASIC by reducing the number of traces used in attack.
AES Differential Power Analysis ASIC Trace Number Weight Repetition Number Weight
Guoyu QIAN Ying ZHOU Yueying XING Yibo FAN Yukiyasu TSUNOO Satoshi GOTO
IPS,WASEDA University,Kitakyushu-shi,8080135 Japan Common Platform Software Research Laboratories,NEC Corp.,Kawasaki-shi,211-8666 Japan
国际会议
2009 IEEE 8th International Conference on ASIC(第八届IEEE国际专用集成电路大会)
长沙
英文
906-909
2009-10-20(万方平台首次上网日期,不代表论文的发表时间)