Cryptology ePrint Archive: Report 2015/512
Key Extraction from the Primary Side of a Switched-Mode Power Supply
Sami Saab and Andrew Leiserson and Michael Tunstall
Abstract: In this paper we detail techniques that can be used to analyze and attack an AES implementation on an FPGA from the primary (i.e., external) side of a switched-mode power supply. Our attack only requires measurements of the duty cycle of the power supply, and then increases the signal-to-noise ratio (SNR) though averaging, deconvolution and wavelet based detrending. The result is an exploitable source of leakage that allows a secret key to be determined from low-frequency power measurements. The techniques and procedures provide a general approach to performing differential power analysis (DPA) from a single point of information for any single hypothesized intermediate value, suggesting their potential for improving other types of side-channel analysis.
Category / Keywords: Side-Channel Analysis, DPA, Switched-Mode Power Supply, Deconvolution, Detrending, Wavelets
Date: received 27 May 2015, last revised 17 Mar 2016
Contact author: sami saab at cryptography com
Available format(s): PDF | BibTeX Citation
Note: Updated paper based on feedback and new results.
Version: 20160317:215349 (All versions of this report)
Short URL: ia.cr/2015/512
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]