Paper 2009/231

Practical DPA Attacks on MDPL

Elke De Mulder, Benedikt Gierlichs, Bart Preneel, and Ingrid Verbauwhede

Abstract

MDPL is a masked logic style that unites principles of dual-rail pre-charge as well as masked logic to achieve resistance against differential power analysis attacks. MDPL has received much attention and numerous papers discussing the security provided by MDPL as well as its weaknesses have been published. As a matter of fact, most of these papers are purely theoretical or provide evidence based on simulations. At present, it is unclear to what extent these concepts affect the security provided by MDPL in practice. We fill this gap and present results of an extensive case study of attacks against an MDPL prototype chip. We demonstrate successful DPA attacks and show that MDPL implementations, resistant to standard DPA attacks, can be broken in practice. Further, we show that the underlying concept of the folding attack, i.e. analysis of probability densities, indeed exposes MDPL's greatest weakness: the masking renders the circuit more vulnerable to attacks than a circuit with a fixed mask. In addition, our analysis leads to novel insights into the power consumption properties of MDPL in real silicon.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Contact author(s)
benedikt gierlichs @ esat kuleuven be
elke demulder @ esat kuleuven be
History
2009-05-30: received
Short URL
https://ia.cr/2009/231
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2009/231,
      author = {Elke De Mulder and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede},
      title = {Practical DPA Attacks on MDPL},
      howpublished = {Cryptology ePrint Archive, Paper 2009/231},
      year = {2009},
      note = {\url{https://eprint.iacr.org/2009/231}},
      url = {https://eprint.iacr.org/2009/231}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.