Cryptology ePrint Archive: Report 2011/077

DPA Leakage Evaluation and Countermeasure Plug-in

Tang Ming and Wang Xiaorong and Qiu Zhenlong and Gao Si and Zhang Huanguo and Wu Qianhong

Abstract: There exist 3 different types of research about SCAs, such as SCA analysis, SCA evaluation and SCA countermeasures. All of these studies try to establish more security in cryptographic software, hardware and system. Evaluation of SCA tries to find factors of different SCAs, moreover, the purpose of SCA Evaluation could be regarded as the first step of building countermeasures against SCAs. We choose DPA, which is one of the most popular and realistic SCAs at present, as our research target to build practical evaluation scheme and countermeasure which can be regarded as plug-in of EDA toolkits and could help designers of circuits to judge the power leakage and improve the resistance against DPAs automatically. Our contribution concludes: more accurate evaluation scheme; more efficient balanced scheme; be portable to build countermeasures based on evaluation scheme, furthermore, our countermeasures could be plug in EDA toolkits which is automatic and transparent to designers of circuits.

Category / Keywords: implementation /

Date: received 14 Feb 2011

Contact author: m tang at 126 com

Available format(s): PDF | BibTeX Citation

Version: 20110220:222531 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]