{"title":"Differential power analysis: Simulated versus experimental attacks","authors":"C. Pitu, R. Câmpeanu","doi":"10.1109/SIITME.2013.6743668","DOIUrl":null,"url":null,"abstract":"This paper presents differences and similarities between experimental and simulated differential power analysis (DPA) based security attacks. DPA attacks are known for many years and experimental attacks have been performed on a large number of hardware and/or software implementations of various cryptographic algorithms (RSA, AES, etc.). Vulnerabilities are mostly discovered after the product has been released to the market making it quasi impossible to fix them. Therefore, a new approach to detecting security vulnerabilities is needed; one that detects flaws early in the design process, before the circuit is manufactured. This method relies on digital simulations rather than on experimental measurements. Simulations are the foundation of functional verification of digital circuits. Using a specifically for this purpose developed software framework, called Power Analysis Toolkit, a comparison between simulated and experimental DPA attacks was performed. The attacked circuit is a hardware implementation of the well-known AES cryptographic algorithm. Results show that, using the correct assumptions, digital simulations can be used to uncover security vulnerabilities.","PeriodicalId":267846,"journal":{"name":"2013 IEEE 19th International Symposium for Design and Technology in Electronic Packaging (SIITME)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE 19th International Symposium for Design and Technology in Electronic Packaging (SIITME)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIITME.2013.6743668","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This paper presents differences and similarities between experimental and simulated differential power analysis (DPA) based security attacks. DPA attacks are known for many years and experimental attacks have been performed on a large number of hardware and/or software implementations of various cryptographic algorithms (RSA, AES, etc.). Vulnerabilities are mostly discovered after the product has been released to the market making it quasi impossible to fix them. Therefore, a new approach to detecting security vulnerabilities is needed; one that detects flaws early in the design process, before the circuit is manufactured. This method relies on digital simulations rather than on experimental measurements. Simulations are the foundation of functional verification of digital circuits. Using a specifically for this purpose developed software framework, called Power Analysis Toolkit, a comparison between simulated and experimental DPA attacks was performed. The attacked circuit is a hardware implementation of the well-known AES cryptographic algorithm. Results show that, using the correct assumptions, digital simulations can be used to uncover security vulnerabilities.