Cryptology ePrint Archive: Report 2009/231
Practical DPA Attacks on MDPL
Elke De Mulder \and Benedikt Gierlichs \and Bart Preneel \and Ingrid Verbauwhede
Abstract: MDPL is a masked logic style that unites principles of dual-rail pre-charge as well as masked logic to achieve resistance against differential power analysis attacks. MDPL has received much attention and numerous papers discussing the security provided by MDPL as well as its weaknesses have been published. As a matter of fact, most of these papers are purely theoretical or provide evidence based on simulations. At present, it is unclear to what extent these concepts affect the security provided by MDPL in practice. We fill this gap and present results of an extensive case study of attacks against an MDPL prototype chip.
We demonstrate successful DPA attacks and show that MDPL implementations, resistant to standard DPA attacks, can be broken in practice.
Further, we show that the underlying concept of the folding attack, i.e. analysis of probability densities, indeed exposes MDPL's greatest weakness: the masking renders the circuit more vulnerable to attacks than a circuit with a fixed mask. In addition, our analysis leads to novel insights into the power consumption properties of MDPL in real silicon.
Category / Keywords:
Date: received 22 May 2009
Contact author: benedikt gierlichs at esat kuleuven be, elke demulder@esat kuleuven be
Available format(s): PDF | BibTeX Citation
Version: 20090530:045546 (All versions of this report)
Short URL: ia.cr/2009/231
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]