USENIX Technical Program - Abstract - Smartcard 99
Investigations of Power Analysis Attacks on Smartcards
Thomas S. Messerges and Ezzy A. Dabbish, Motorola Labs; Robert H. Sloan, University of Illinois at Chicago
Abstract
This paper presents actual results from monitoring
smartcard power signals and introduces techniques that help maximize such
side-channel information. Adversaries will obviously choose attacks that
maximize side-channel information, so it is very important that the strongest
attacks be considered when designing defensive strategies. In this paper,
power analysis techniques used to attack DES are reviewed and analyzed.
The noise characteristics of the power signals are examined and an approach
to model the signal to noise ratio is proposed. Test results from monitoring
power signals are provided. Next, approaches to maximize the information
content of the power signals are developed and tested. These results provide
guidance for designing smartcard solutions that are secure against power
analysis attacks.
- View the full text of this paper in
HTML form and
PDF form. The presentation
slides in PDF format are also available.
- If you need the latest Adobe Acrobat Reader, you can download it from Adobe's site.
- To become a USENIX Member, please see our Membership Information.
|