Loading…

Practical DPA attacks on MDPL

There exist only two articles that present clear results of practical DPA attacks against an MDPL prototype chip and both are essentially in favour of its security. Unsuccessful attacks are however only weak evidence of security, and at present it is unclear to what extent some proposed theoretical...

Full description

Saved in:
Bibliographic Details
Main Authors: De Mulder, E., Gierlichs, B., Preneel, B., Verbauwhede, I.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:There exist only two articles that present clear results of practical DPA attacks against an MDPL prototype chip and both are essentially in favour of its security. Unsuccessful attacks are however only weak evidence of security, and at present it is unclear to what extent some proposed theoretical concepts affect the security provided by MDPL in practice. We fill this gap and present results of an extensive case study of attacks against an MDPL prototype chip. In contrast with other practical works, we demonstrate successful DPA attacks and show that MDPL implementations, resistant to standard DPA attacks, can be broken in practice. Further, we show that the underlying concept of the folding attack, i.e. analysis of probability densities, indeed exposes MDPL's greatest weakness: the masking renders the circuit more vulnerable to attacks than a circuit with a fixed mask. In addition, our analysis leads to novel insights into the power consumption properties of MDPL in real silicon.
ISSN:2157-4766
DOI:10.1109/WIFS.2009.5386455