[5597] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Power analysis of AES candidates

daemon@ATHENA.MIT.EDU (Eli Brandt)
Tue Sep 14 21:03:07 1999

To: crypto list <cryptography@c2.net>
Date: Tue, 14 Sep 1999 20:21:57 -0400 (EDT)
From: Eli Brandt <eli@v.gp.cs.cmu.edu>
In-Reply-To: <m3yae96nve.fsf@soma.andreas.org> from "Andreas Bogk" at Sep 15, 99 00:04:53 am
Reply-To: eli+@cs.cmu.edu

Andreas Bogk wrote:
> The usual setup for DPA involves a 10 Ohm resistor which sits in the
> power supply and measuring the voltage across that resistor. The
> countermeasure we're talking about is an on-chip capacitor that
> smoothes the power consumption, [...]

Has this been analyzed?  It's got to take the high-freqency
information the attacker's looking for so far below the thermal noise
floor that it can't recovered by averaging multiple runs.  I do DSP,
not EE, but I'd think this smoothing capacitor would effect a one-pole
lowpass filter.

If so, doubling the cap size halves the cutoff frequency (right?),
halving the leaked power.  Integrating runs gives signal voltage
linear in n and noise voltage sqrt(n); voltage ratio is sqrt; power
ratio is linear.  So leaked-signal power is
        Theta( (attacker's number of runs) / (capacitor size) ).
No asymptotic edge either way; attacker wins against bounded cap size.
</handwave>

-- 
     Eli Brandt  |  eli+@cs.cmu.edu  |  http://www.cs.cmu.edu/~eli/


home help back first fref pref prev next nref lref last post