Presentation 2004/3/8
Evaluation of DPA Resistivity of DES Implementation by Simulations
Akihiko SASAKI, Koki ABE,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) The differential power analysis (DPA) attacks have posed a serious threat to cryptosystems designed without concerns about this type of attacks. Several implementation methods for increasing the DPA resistivity have been proposed. However, with respect to tradeoffs between the implementation cost and its security perfomance, it is desirable to be able to predict the degree to which a given design can resist against the attacks before it is implemented. In this paper we propose two simulation methods, software and circuit simulations, and illustrate their effectiveness of predicting the DPA vulnerability by applying them to a DES design as an attacked target.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) DPA / Simulation / DES
Paper # IT2003-60,ISEC2003-100,WBS2003-178
Date of Issue

Conference Information
Committee ISEC
Conference Date 2004/3/8(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Evaluation of DPA Resistivity of DES Implementation by Simulations
Sub Title (in English)
Keyword(1) DPA
Keyword(2) Simulation
Keyword(3) DES
1st Author's Name Akihiko SASAKI
1st Author's Affiliation Department of Computer Science, The University of Electro-Communications()
2nd Author's Name Koki ABE
2nd Author's Affiliation Department of Computer Science, The University of Electro-Communications
Date 2004/3/8
Paper # IT2003-60,ISEC2003-100,WBS2003-178
Volume (vol) vol.103
Number (no) 712
Page pp.pp.-
#Pages 6
Date of Issue