Learn More
Random clock armed cryptosystems inject an intended misalignment in captured power traces while the system is running encryption or decryption. This is a powerful counter-measure against Correlation Power Analysis (CPA) in practice. In order to remove such a countermeasure, a trace preprocessing is necessary before mounting power attacks. In this paper, we(More)
Differential power analysis (DPA) becomes cumbersome when the analyzed traces are misaligned. The misalignment can be caused by deliberately inserting dummy wait states, random CPU stalls, or a random clock. In this paper we discuss clock frequency effects in random clock equipped cryptosystems and show that the power traces captured accordingly feature not(More)
Using a random number generator for the control of the input clock in FPGA-based cryptographic systems causes misalignments in the power traces, which can be exploited as a countermeasure against Correlation Power Analysis (CPA). In this paper we propose a method to process such misaligned traces in order to identify power peaks dynamically and to align(More)
Cryptosystems are enabled to produce misaligned power traces in time domain either by inserting randomly dummy wait states or by exploiting a random clock generator, which can be seen as countermeasures to Differential Power Analysis (DPA), a well-known approach to mount side-channel attacks. In this paper, we consider such a random clock armed FPGA-based(More)
Correlation Power Analysis (CPA) is an efficient method to reveal the key of a physical cryptosystem in practice. At a first glance, the Power Amount Analysis (PAA) may be seen as just a variant of the CPA method, but PAA relies on a completely different understanding of the noise in power traces. The latter exploits a large number of time points in the(More)
In the last decade, many side channel attacks have been published in academic literature detailing how to efficiently extract secret keys by mounting various attacks, such as differential or correlation power analysis, on cryptosystems. Among the most efficient and widely utilized leakage models involved in these attacks are the Hamming weight and distance(More)
Correlation power analysis, a method aiming to reveal the secrets of a cryptosystem, is based on one fixed time point of the captured power traces, which unveils the largest key dependent information leakage. In this paper, we propose a new power trace model based on communication theory to better understand and to efficiently exploit power traces in side(More)
  • 1