University Circle Inc.
Side channel analysis can be used to derive secret/private keys used in naive implementations of cryptographic algorithms. Such attacks typically involve demonstrating the relationship between the data being manipulated by a microprocessor or FPGA, and the instantaneous power consumption of the device. When statistical power attacks are applied to software implementations of block ciphers, the secret key can be derived in stages dictated by the size of the substitution tables (S-boxes) used. When statistical power attacks are applied to other algorithms that make use of 32-bit, or larger, variables, the complexity of a statistical power attack is dictated by the size of the machine word used by a microprocessor.