By Topic

An instruction-level software simulation approach to resistance evaluation of cryptographic implementations against power analysis attacks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Jiantang Li ; State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, P. O. Box 8718, Beijing, China ; Yongbin Zhou ; Jiye Liu ; Hailong Zhang

Power analysis attack, one of the most important side-channel cryptanalysis, poses serious threats to the physical security of cryptographic implementations. In order to assess the physical security of cryptographic implementations, especially within design phases, some fundamental supporting tools appear to be highly helpful. Additionally, such tools are also necessary for performing fair comparisons among various power analysis attacks and different countermeasures. Motivated by this, we proposed an instruction-level power consumption software simulation approach, aiming to analyze and assess the resistance of cryptographic implementations against power analysis attack. One prototype system, which is called IMScale, is developed to validate the correctness and feasibility of our approach. Using IMScale, we carried out multiple DPA attacks against an unprotected AES implementation and a masked AES implementation as well. The results of our experiments firmly validate the correctness and feasibility of our instruction-level power consumption software simulation approach, which are also completely consistent with known ones.

Published in:

Computer Science and Automation Engineering (CSAE), 2011 IEEE International Conference on  (Volume:2 )

Date of Conference:

10-12 June 2011