On two DES implementations secure against differential power analysis in smart-cards

Jiqiang Lv

Research output: Contribution to journalArticleAcademicpeer-review

4 Citations (Scopus)

Abstract

Masking is one of the efficient and easily implemented countermeasures to protect cryptographic algorithms in such resource limited environments as smart-cards from differential power analysis as well as simple power analysis that were first introduced by Kocher et al. in 1999. To defend differential power analysis attacks, Akkar and Giraud presented a Transformed Masking Method and applied it to DES implementation in 2001. Unfortunately, in 2003, Akkar and Goubin showed a superposition attack that actually is a high-order differential power analysis attack on Akkar and Giraud’s DES implementation using Transformed Masking Method, and finally they presented a DES implementation using their proposed Unique Masking Method to defend any order differential power analysis attacks, which was later improved by Akkar, Bévan and Goubin in 2004. In this paper, by exploiting a new artifice to classify the electric consumption curves, we show that Akkar, Bévan and Goubin’s improved DES implementation using Unique Masking Method is still vulnerable to a high-order differential power analysis attack. Besides, we find it is also vulnerable to a superposition attack. We also present four new differential power analysis attacks on Akkar and Giraud’s DES implementation using Transformed Masking Method.
Original languageEnglish
Pages (from-to)1179-1193
JournalInformation and Computation
Volume204
Issue number7
DOIs
Publication statusPublished - 2006

Fingerprint

Dive into the research topics of 'On two DES implementations secure against differential power analysis in smart-cards'. Together they form a unique fingerprint.

Cite this