Abstract
Research on Differential Power Analysis (DPA) is becoming more and more popular nowadays. Against different hardware, DPA attack will lead to different results, e.g. attack on FPGA is easy but on ASIC is relatively difficult. However, how could we draw the conclusion that we finish a successful attack? How to build the connection between result data and successful rate is a meaningful topic. Same data with different statistical processing method will lead to different results. In this paper, wefocus on DPA attack against an ASIC implementation. We analyzed two current statistical methods, pointed out the limitations. Then, we proposed a weighted statistical analysis method. According to number oftraces and repetitions, we adjust the weight value. Finally, we improved the accuracy and efficiency of DPA attack on ASIC by reducing the number of traces used in attack.
Original language | English |
---|---|
Title of host publication | ASICON 2009 - Proceedings 2009 8th IEEE International Conference on ASIC |
Pages | 906-909 |
Number of pages | 4 |
DOIs | |
Publication status | Published - 2009 |
Event | 2009 8th IEEE International Conference on ASIC, ASICON 2009 - Changsha Duration: 2009 Oct 20 → 2009 Oct 23 |
Other
Other | 2009 8th IEEE International Conference on ASIC, ASICON 2009 |
---|---|
City | Changsha |
Period | 09/10/20 → 09/10/23 |
Keywords
- AES
- ASIC
- Differential power analysis
- Repetition number weight
- Trace number weight
ASJC Scopus subject areas
- Hardware and Architecture
- Electrical and Electronic Engineering