Correlation Power Analysis of Large Word Sizes

Side channel analysis can be used to derive secret/private keys used in naive implementations of cryptographic algorithms. Such attacks typically involve demonstrating the relationship between the data being manipulated by a microprocessor or FPGA, and the instantaneous power consumption of the device. When statistical power attacks are applied to software implementations of block ciphers, the secret key can be derived in stages dictated by the size of the substitution tables (S-boxes) used. When statistical power attacks are applied to other algorithms that make use of 32-bit, or larger, variables, the complexity of a statistical power attack is dictated by the size of the machine word used by a microprocessor.

Provided by: University Circle Inc. Topic: Security Date Added: Sep 2007 Format: PDF

Find By Topic