Cryptology ePrint Archive: Report 2015/512

Key Extraction from the Primary Side of a Switched-Mode Power Supply

Sami Saab and Andrew Leiserson and Michael Tunstall

Abstract: In this paper we detail techniques that can be used to analyze and attack an AES implementation on an FPGA from the primary (i.e., external) side of a switched-mode power supply. Our attack only requires measurements of the duty cycle of the power supply, and then increases the signal-to-noise ratio (SNR) though averaging, deconvolution and wavelet based detrending. The result is an exploitable source of leakage that allows a secret key to be determined from low-frequency power measurements. The techniques and procedures provide a general approach to performing differential power analysis (DPA) from a single point of information for any single hypothesized intermediate value, suggesting their potential for improving other types of side-channel analysis.

Category / Keywords: Side-Channel Analysis, DPA, Switched-Mode Power Supply, Deconvolution, Detrending, Wavelets

Date: received 27 May 2015, last revised 17 Mar 2016

Contact author: sami saab at cryptography com

Available format(s): PDF | BibTeX Citation

Note: Updated paper based on feedback and new results.

Version: 20160317:215349 (All versions of this report)

Short URL: ia.cr/2015/512

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]