Home > Security IP > DPA Countermeasures > DPA Countermeasure Validation Program
Designed to deliver consistent, high-quality results for the certification of cryptographic modules, our Differential Power Analysis (DPA) Countermeasure Validation Program is a comprehensive and rigorous security testing procedure that uses independent accredited testing labs.
Side-channel attacks conducted against electronic gear are relatively simple and inexpensive to execute. Such attacks include simple power analysis (SPA) and Differential Power Analysis (DPA). As all physical electronic systems routinely leak information, effective side-channel countermeasures should be implemented at the design stage to ensure protection of sensitive keys and data.
Brightsight bv
Delftechpark 1
2628 XJ DELFT
The Netherlands
Tel: +31 15 269 2510
Fax: +31 15 269 2555
[email protected]
Riscure BV
Frontier Building
Delftechpark 49
2628 XJ Delft
The Netherlands
Tel: +31 (0)15 251 4090
Fax: +31 (0)15 251 4099
[email protected]
T-Systems
Vorgebirgsstrasse 49
53119 Bonn
Germany
Contact : Robert Hammelrath, Head of Security Analysis & Testing
Tel: +49 (0)228 9841 1140
Fax: +49 (0)228 9841 6000
[email protected]
Thales CEACI
18, Avenue Edouard Belin BPI 1414
31401 Toulouse Cedex 9
France
Contact : Remy Daudigny, ITSEF Director & E²Lab Technical Manager
Tel: +33 (0)5 62 88 28 08
[email protected]
Licensed vendors with products that have successfully passed the independent security tests in the DPA Countermeasure Validation Program are permitted to use the DPA Lockâ„¢ logo on compliant products, packaging, and marketing materials.
The DPA security logo gives customers assurance of two main benefits:
1. The device implements effective DPA countermeasures, the effectiveness of which have been tested and verified by a qualifying independent testing lab, and
2. The product has obtained the necessary patent license from Cryptography Research
Side-channel attacks comprise a wide range of techniques including Differential Power Analysis, Simple Power Analysis, Simple Electromagnetic Analysis, Differential Electromagnetic Analysis, Correlation Power Analysis and Correlation Electromagnetic Analysis. An effective layer of side-channel countermeasures should therefore be implemented via hardware (DPA resistant cores), software (DPA resistant libraries) or both. After layered countermeasures have been implemented, systems should be carefully evaluated to confirm the cessation of sensitive side-channel leakage.
DPA Countermeasures are fundamental techniques for protecting against Differential Power Analysis (DPA) and related side-channel attacks. Consisting of a broad range of software, hardware, and protocol techniques, DPA Countermeasures include reducing leakage, introducing amplitude and temporal noise, balancing hardware and software, incorporating randomness, and implementing protocol level countermeasures.
Videos