Skip to main content

DPA Countermeasure Based on the “Masking Method”

  • Conference paper
  • First Online:
Information Security and Cryptology — ICISC 2001 (ICISC 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2288))

Included in the following conference series:

Abstract

We propose a new differential power analysis (DPA) countermeasure based on the “masking method” proposed by Messerges [11]. We also evaluate the security of our method by introducing a new idea of “probabilistic DPA.” Its processing speed is as fast as that of the straight-forward implementation, and it requires little RAM so it is suitable for low-cost smartcards.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mehdi-Larurent Akkar, Regis Bevan, Paul Dischamp and Didier Moyart, “Power Analysis, What is Now Possible...”, Advances in Cryptology-ASIACRYPT 2000, pp.489–502.

    Google Scholar 

  2. Mehdi-Larurent Akkar, Chiristophe Giraud, “An implementation of DES and AES, secure against some attacks”, Cryptographic Hardware and Embedded Systems (CHES 2001).

    Google Scholar 

  3. Suresh Chari, Charanjit S. Jutla, Josyula R. Rao and Pankaj Rohtagi, “A cautionary note regarding evaluation of AES candidates on smart-cards”, AES round 2.

    Google Scholar 

  4. Suresh Chari, Charanjit S. Julta, Josyula R. Rao and Pankaj Rohtagi, “Towards Sound Apporoaches to Counteract Power-Analysis Attacks”, Advances in Cryptography-CRYPTO’99, pp.398–412.

    Google Scholar 

  5. Christophe Clavier and Marc Joye, “Universal Exponentiation Algorithm-A FirstStep Towards Provable SPA-resistence-”, Cryptographic Hardware and Embedded Systems (CHES 2001).

    Google Scholar 

  6. Jean-Sébastein Coron, “Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems”, Cryptographic Hardware and Embedded Systems (CHES’99), pp.292–302.

    Google Scholar 

  7. Jean-Sébastein Coron and Louis Goubin, “On Boolean and Arithmetic Masking against Differential Power Analysis”, Cryptographic Hardware and Embedded Systems, Cryptographic Hardware and Embedded Systems (CHES 2000), pp.231–237.

    Google Scholar 

  8. Louis Goubin and Jacques Patarin, “DES and Differential Power Analysis.-The Duplication Method-”, Cryptographic Hardware and Embedded Systems (CHES 2001).

    Google Scholar 

  9. Marc Joye and Christphe Tymen, “Protection against Differential Analysis for Elliptic Curve Cryptography-An Algebraic Apporoach-”, Cryptographic Hardware and Embedded Systems (CHES 2001).

    Google Scholar 

  10. Paul Kocher, Joshua Jaffe, and Benjamin Jun “Differential Power Analysis”, Advances in Cryptography-CRYPTO’99, pp.388–397.

    Google Scholar 

  11. Thomas S. Messerges, Ezzy A. Dabbish and Robert H. Sloan “Power Analysis Attacks of Modular Exponentiation in Smartcards.”, Cryptographic Hardware and Embedded Systems (CHES’99), pp.144–157.

    Google Scholar 

  12. Thomas S. Messerges, “Securing the AES Finialists Against Power Analysis Attacks”, Fast Software Encryption (FSE 2000), pp.150–164.

    Google Scholar 

  13. Thomas S. Messerges, “Using Second-Order Power Analysis to Attack DPA Resistant Software”, Cryptographic Hardware and Embedded Systems (CHES 2000), pp.238–251.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Itoh, K., Takenaka, M., Torii, N. (2002). DPA Countermeasure Based on the “Masking Method”. In: Kim, K. (eds) Information Security and Cryptology — ICISC 2001. ICISC 2001. Lecture Notes in Computer Science, vol 2288. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45861-1_33

Download citation

  • DOI: https://doi.org/10.1007/3-540-45861-1_33

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43319-4

  • Online ISBN: 978-3-540-45861-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics