DPA Countermeasures

>>>DPA Countermeasures

Introduction to Side-Channel Attacks

Side-channel attacks conducted against electronic gear are relatively simple and inexpensive to execute. Such attacks include simple power analysis (SPA) and Differential Power Analysis (DPA). An attacker does not need to know specific implementation details of the cryptographic device to perform these attacks and extract keys. As all physical electronic systems routinely leak information, effective [...]

DPA Workstation Analysis Platform Product Brief

Our DPA Workstation™ (DPAWS) 8 is a comprehensive analysis platform for the evaluation of device resistance to side-channel attacks, including SPA, DPA, HO-DPA, and EMA. Side-channel attacks are low-cost, noninvasive methods that enable attackers to extract secret cryptographic keys from electronic devices during normal operations. Build to support every stage of the side-channel analysis process, [...]

DPA Resistant Software Library Product Brief

Addressing the growing demand for readily available solutions that implement Differential Power Analysis (DPA) countermeasures, Rambus Cryptography Research developed a family of semiconductor IP cryptographic cores and software libraries that are designed to protect against side-channel attack vulnerabilities. Our DPA Resistant Software Library incorporates many of the commonly used cryptographic algorithms. This library is validated [...]

DPA Resistant Hardware Cores Product Brief

The DPA Resistant AES Core is a high-security AES primitive that offers chipmakers an easy-to-integrate security solution with built-in side-channel resistance for cryptographic functions across a wide range of connected devices. This high-performance core offers both encryption and decryption functions with key size options of 128- and 256-bits. It provides robust, flexible side-channel resistance for [...]

DPA Countermeasures Solution Overview

Download "DPA Countermeasures Solution Overview" Our Cryptography Research division discovered Simple Power Analysis (SPA) and Differential Power Analysis (DPA), and developed fundamental solutions and techniques for protecting devices against DPA and related side-channel attacks, along with supporting tools, programs, and services.

Test Vector Leakage Assessment (TVLA) Derived Test Requirements (DTR) with AES

Download "Test Vector Leakage Assessment (TVLA) Derived Test Requirements (DTR) with AES" This document describes requirements and test procedures for qualifying DPA-resistant implementations of cryptographic algorithms with specific instructions and test vectors for AES. Expected lab and analyst proficiency, device setup, data acquisition, signal processing, analysis and evaluation procedures are described herein. [...]

Is Your Mobile Device Radiating Keys?

Download "Is Your Mobile Device Radiating Keys?" Is your mobile device's EM emissions leaking your keys? A mobile app can inadvertently radiate secret data as cryptographic processing is done by the CPU. We'll use a simple antenna and radio to perform live key extraction from several modern handheld devices. Developers can use several [...]

Mobile Device Security: The case for side channel resistance

Download "Mobile Device Security: The case for side channel resistance" As the functionality of mobile devices has increased, so have the threats. These devices make attractive targets, given the sensitivity of user and corporate data they process and store, their emerging use for viewing protected content and conducting sensitive banking and payment transactions. [...]

A testing methodology for side­-channel resistance validation

Download "A testing methodology for side­channel resistance validation" The goal of a side‐channel resistance validation program is to assess whether a cryptographic module utilizing side‐channel analysis countermeasures can provide resistance to these attacks commensurate with the desired security level. While, no standardized testing program can guarantee resistance against all attacks, an effective program [...]

Leakage resistant encryption and decryption

Download "Leakage resistant encryption and decryption" Data encryption and decryption operations are basic building blocks for most security applications. For this purpose, most systems use block ciphers, such as the public AES standard. It is well known, however, that implementations of block ciphers such as AES, as well as other cryptographic algorithms, [...]