Abstract
In this article we describe an improved concept for second order differential-power analysis (DPA) attacks on masked smart card implementations of block ciphers. Our concept allows to mount second order DPA attacks in a rather simple way: a second-order DPA attack consists of a pre-processing step and a DPA step. Therefore, our way of performing second-order DPA attacks allows to easily assess the number of traces that are needed for a successful attack. We give evidence on the effectiveness of our methodology by showing practical attacks on a masked AES smart card implementation. In these attacks we target inputs and outputs of the SubBytes operation in the first encryption round.
| Translated title of the contribution | Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers |
|---|---|
| Original language | English |
| Title of host publication | RSA Conference 2006, Cryptographers' Track |
| Editors | D. Pointcheval |
| Publisher | Springer |
| Pages | 192 - 207 |
| Volume | 3860 |
| Publication status | Published - 2006 |