Paper 2005/311

What do S-boxes Say in Differential Side Channel Attacks?

Cecile Canovas and Jessy Clediere

Abstract

Cryptographic devices are vulnerable against the now well-known side channel leakage analysis. Secret data, such as keys, can be revealed by attacks like DPA, DEMA, CPA. However, this kind of attacks also exhibits wrong keys, this phenomenon being known as the "ghost peaks" problem and has been briefly explained in CPA. We give here a comprehension and analysis of the ghost peak problem that occurs in differential analysis regarding to different power consumption model and various weighting techniques.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
side channeldifferential power analysisDPADEMACPADESS-boxcorrelationghost peaks
Contact author(s)
cecile canovas @ cea fr
History
2005-12-21: revised
2005-09-12: received
See all versions
Short URL
https://ia.cr/2005/311
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2005/311,
      author = {Cecile Canovas and Jessy Clediere},
      title = {What do S-boxes Say in Differential Side Channel Attacks?},
      howpublished = {Cryptology ePrint Archive, Paper 2005/311},
      year = {2005},
      note = {\url{https://eprint.iacr.org/2005/311}},
      url = {https://eprint.iacr.org/2005/311}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.