This item still needs to be validated !
ITEM METADATA RECORD
Title: Power-Analysis Attacks on an FPGA - First Experimental Results
Authors: Ors, SB
Oswald, Elisabeth
Preneel, Bart
Issue Date: 2003
Publisher: Springer
Host Document: Lecture Notes in Computer Science vol:2779 pages:35-50
Conference: CHES 2003 date:October 08-10, 2003
Abstract: Field Programmable Gate Arrays (FPGAs) are becoming increasingly popular, especially for rapid prototyping. For implementations of cryptographic algorithms, not only the speed and the size of the circuit are important, but also their security against implementation attacks such as side-channel attacks. Power-analysis attacks are typical examples of side-channel attacks, that have been demonstrated to be effective against implementations without special countermeasures. The flexibility of FPGAs is an important advantage in real applications but also in lab environments. It is therefore natural to use FPGAs to assess the vulnerability of hardware implementations to power-analysis attacks. To our knowledge, this paper is the first to describe a setup to conduct power-analysis attacks on FPGAs. We discuss the design of our hand-made FPGA-board and we provide a first characterization of the power consumption of a Virtex 800 FPGA. Finally we provide strong evidence that implementations of elliptic curve cryptosystems without specific countermeasures are indeed vulnerable to simple power-analysis attacks.
URI: 
ISSN: 0302-9743
Publication status: published
KU Leuven publication type: IC
Appears in Collections:Electrical Engineering - miscellaneous
ESAT - STADIUS, Stadius Centre for Dynamical Systems, Signal Processing and Data Analytics

Files in This Item:
File Status SizeFormat
article-17.pdf Published 959KbAdobe PDFView/Open

 


All items in Lirias are protected by copyright, with all rights reserved.

© Web of science