In this paper, attacks aiming at recovering the secret key of a cryptographic core from measurements of its static (leakage) power are presented. These attacks exploit the dependence of the leakage current of CMOS Integrated Circuits (ICs) on their inputs (e.g., the secret key of a cryptographic circuit). For this reason, these novel attacks are referred to as Leakage Power Analysis (LPA) attacks in this paper. Since the leakage power increases much faster than the dynamic power at each new technology node, LPA attacks are shown to be a serious threat to information security of cryptographic circuits in sub-100 nm technologies. For the first time in the literature, a well-defined procedure to perform LPA attacks is presented. Advantages and measurement issues are also analyzed in comparison with traditional Power Analysis attacks based on dynamic power measurements. An experimental attack to a register is finally performed for the first time. ©2009 IEEE.

Leakage power analysis attacks: Well-defined procedure and first experimental results / Alioto, M.; Giancane, L.; Scotti, G.; Trifiletti, A.. - (2009), pp. 46-49. (Intervento presentato al convegno 21th International Conference on Microelectronics, ICM 2009 tenutosi a Marrakech, mar) [10.1109/ICM.2009.5418592].

Leakage power analysis attacks: Well-defined procedure and first experimental results

Giancane L.;Scotti G.;Trifiletti A.
2009

Abstract

In this paper, attacks aiming at recovering the secret key of a cryptographic core from measurements of its static (leakage) power are presented. These attacks exploit the dependence of the leakage current of CMOS Integrated Circuits (ICs) on their inputs (e.g., the secret key of a cryptographic circuit). For this reason, these novel attacks are referred to as Leakage Power Analysis (LPA) attacks in this paper. Since the leakage power increases much faster than the dynamic power at each new technology node, LPA attacks are shown to be a serious threat to information security of cryptographic circuits in sub-100 nm technologies. For the first time in the literature, a well-defined procedure to perform LPA attacks is presented. Advantages and measurement issues are also analyzed in comparison with traditional Power Analysis attacks based on dynamic power measurements. An experimental attack to a register is finally performed for the first time. ©2009 IEEE.
2009
21th International Conference on Microelectronics, ICM 2009
LPA, Hardware security, side channel attacks
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Leakage power analysis attacks: Well-defined procedure and first experimental results / Alioto, M.; Giancane, L.; Scotti, G.; Trifiletti, A.. - (2009), pp. 46-49. (Intervento presentato al convegno 21th International Conference on Microelectronics, ICM 2009 tenutosi a Marrakech, mar) [10.1109/ICM.2009.5418592].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1615010
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 17
  • ???jsp.display-item.citation.isi??? ND
social impact