Abstract
Paul Kocher recently developped attacks based on the electric consumption of chips that perform cryptographic computations. Among those attacks, the “Differential Power Analysis” (DPA) is probably one of the most impressive and most difficult to avoid.
Note
An extended version of this paper can be obtained from the authors.
Patents Pending
Chapter PDF
Similar content being viewed by others
Keywords
- Electric Consumption
- Cryptographic Algorithm
- Fundamental Hypothesis
- Consumption Curve
- Simple Power Analysis
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Paul Kocher, Joshua Jaffe, Benjamin Jun, Introduction to Differential Power Analysis and Related Attacks, 1998. This paper is available at http://www.cryptography.com/dpa/technical/index.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Goubin, L., Patarin, J. (1999). DES and Differential Power Analysis The “Duplication” Method. In: Koç, Ç.K., Paar, C. (eds) Cryptographic Hardware and Embedded Systems. CHES 1999. Lecture Notes in Computer Science, vol 1717. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48059-5_15
Download citation
DOI: https://doi.org/10.1007/3-540-48059-5_15
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66646-2
Online ISBN: 978-3-540-48059-4
eBook Packages: Springer Book Archive