Information Technology Reference
In-Depth Information
Fig. 17. Correlation results for DPA attack of Serpent sub-module when the real sub-
key is 13 ( T =2 . 0K =1 . 0 E k ).
Fig. 18. Correlation of Correct Subkey (SK) with all possible key guesses applied to
the Serpent sub-module ( T =2 . 0K =1 . 0 E k ). The results in each column can be
visualized as a cross section of results equivalent to that shown in Figs. 16 or 17 for
each correct subkey at 2000 power points.
in the total power. The vulnerability of the circuit is due to the close relationship
between the processed key-related information and the corresponding power dis-
sipation. Generally, if more cells or gates are involved in this processing, it is
easier for an attacker to perform a power analysis attack.
Search WWH ::




Custom Search