Wang Peng-Jun, Zhang Yue-Jun, Zhang Xue-Long. Research of Differential Power Analysis Countermeasures[J]. Journal of Electronics & Information Technology, 2012, 34(11): 2774-2784. doi: 10.3724/SP.J.1146.2012.00555
Citation:
Wang Peng-Jun, Zhang Yue-Jun, Zhang Xue-Long. Research of Differential Power Analysis Countermeasures[J]. Journal of Electronics & Information Technology, 2012, 34(11): 2774-2784. doi: 10.3724/SP.J.1146.2012.00555
Wang Peng-Jun, Zhang Yue-Jun, Zhang Xue-Long. Research of Differential Power Analysis Countermeasures[J]. Journal of Electronics & Information Technology, 2012, 34(11): 2774-2784. doi: 10.3724/SP.J.1146.2012.00555
Citation:
Wang Peng-Jun, Zhang Yue-Jun, Zhang Xue-Long. Research of Differential Power Analysis Countermeasures[J]. Journal of Electronics & Information Technology, 2012, 34(11): 2774-2784. doi: 10.3724/SP.J.1146.2012.00555
Differential Power Analysis (DPA) attacks exploit the data or instruction dependency of the power consumption of the cryptographic devices during encryption/decryption process. A large number of power traces are used to analyze the cipher key information on mathematics statistical methods. DPA attacks have been becoming a great threat to cipher security. In order to systematically and comprehensively understand DPA countermeasures, and actively promote the studying of high performance cryptographic chip, this paper introduces the basic principle of DPA, explains and analyzes the mainstream DPA countermeasures, and points out the advanced topics countermeasures. This paper focuses on the theory of DPA countermeasures, the flow path of algorithm, and the implementation of circuits, including masking technology, hiding technology, power disruption technology and so on. The advantages and disadvantages of these countermeasures are detailed discussed. Finally, the potential research directions and advanced topics on DPA countermeasures are provided.