Power trace alignment for cryptosystems featuring random frequency countermeasures

Qizhi Tian, Abdulhadi Shoufan, Marc Stoettinger, Sorin A. Huss

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

Using a random number generator for the control of the input clock in FPGA-based cryptographic systems causes misalignments in the power traces, which can be exploited as a countermeasure against Correlation Power Analysis (CPA). In this paper we propose a method to process such misaligned traces in order to identify power peaks dynamically and to align them partially. After removing the misalignment caused by such a countermeasure and a subsequent trace processing the cryptosystem may easily be attacked by the CPA method. By means of a comprehensive measurement and analysis process of an AES 128 bit block cipher we demonstrate that the proposed method can deal with misaligned traces very efficiently.

Original languageBritish English
Title of host publication2012 2nd International Conference on Digital Information Processing and Communications, ICDIPC 2012
Pages51-55
Number of pages5
DOIs
StatePublished - 2012
Event2012 2nd International Conference on Digital Information Processing and Communications, ICDIPC 2012 - Klaipeda City, Lithuania
Duration: 10 Jul 201212 Jul 2012

Publication series

Name2012 2nd International Conference on Digital Information Processing and Communications, ICDIPC 2012

Conference

Conference2012 2nd International Conference on Digital Information Processing and Communications, ICDIPC 2012
Country/TerritoryLithuania
CityKlaipeda City
Period10/07/1212/07/12

Keywords

  • AES-128 Block Cipher
  • Correlation Power Analysis
  • Power Attack Countermeasures
  • Traces Alignment

Fingerprint

Dive into the research topics of 'Power trace alignment for cryptosystems featuring random frequency countermeasures'. Together they form a unique fingerprint.

Cite this