@inproceedings{4e97d2daa24449698aa67d74d77e458a,
title = "Differential power analysis model and some results",
abstract = "CMOS gates consume different amounts of power whether their output has a falling or a rising edge. Therefore the overall power consumption of a CMOS circuit leaks information about the activity of every single gate. This explains why, using differential power analysis (DPA), one can infer the value of specific nodes within a chip by monitoring its global power consumption only. We model the information leakage in the framework used by conventional cryptanalysis. The information an attacker can gain is derived as the autocorrelation of the Hamming weight of the guessed value for the key. This model is validated by an exhaustive electrical simulation. Our model proves that the DPA signal-to-noise ratio increases when the resistance of the substitution box against linear cryptanalysis increases. This result shows that the better shielded against linear cryptanalysis a block cipher is, the more vulnerable it is to side-channel attacks such as DPA.",
keywords = "Cryptanalysis, DPA electrical simulation, DPA model, DPA signal-to-noise ratio, Differential power analysis (DPA), Substitution box (S-Box)",
author = "Sylvain Guilley and Philippe Hoogvorst and Renaud Pacalet",
year = "2004",
month = jan,
day = "1",
language = "English",
isbn = "1402081464",
series = "IFIP Advances in Information and Communication Technology",
publisher = "Springer New York LLC",
pages = "127--141",
booktitle = "Smart Card Research and Advanced Applications VI - IFIP 18th World Computer Congress, TC8/WG8.8 and TC11/WG11.2 6th Int. Conference on Smart Card Research and Advanced Applications, CARDIS 2004",
note = "IFIP TC8/WG8.8 and TC11/WG11.2 6th International Conference on Smart Card Research and Advanced Applications, CARDIS 2004 ; Conference date: 22-08-2004 Through 27-08-2004",
}