[5598] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Power analysis of AES candidates

daemon@ATHENA.MIT.EDU (Eugene Leitl)
Wed Sep 15 07:32:21 1999

From: Eugene Leitl <eugene.leitl@lrz.uni-muenchen.de>
Date: Tue, 14 Sep 1999 23:59:12 -0700 (PDT)
To: eli+@cs.cmu.edu
Cc: crypto list <cryptography@c2.net>
In-Reply-To: <199909150022.RAA06139@blacklodge.c2.net>

Eli Brandt writes:

 > If so, doubling the cap size halves the cutoff frequency (right?),
 > halving the leaked power.  Integrating runs gives signal voltage
 > linear in n and noise voltage sqrt(n); voltage ratio is sqrt; power
 > ratio is linear.  So leaked-signal power is
 >         Theta( (attacker's number of runs) / (capacitor size) ).
 > No asymptotic edge either way; attacker wins against bounded cap size.
 > </handwave>

I don't quite understand your handwave analysis: if we use
supercapacitors we can power the embedded unit for hours straight. A
typical encryption round completes in milliseconds at best, I don't
see how microsecond spike demands can ever leak out regardless whether
we measure till the Big Crunch or the day after tomorrow.

Apart from such crude-but-effective countermeasures we haven't even
begun tackling lunatic fringe stuff like reversible computation.


home help back first fref pref prev next nref lref last post