Power-analysis attacks on an FPGA - First experimental results

Siddika Berna Örs*, Elisabeth Oswald, Bart Preneel

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

123 Citations (Scopus)

Abstract

Field Programmable Gate Arrays (FPGAs) are becoming increasingly popular, especially for rapid prototyping. For implementations of cryptographic algorithms, not only the speed and the size of the circuit are important, but also their security against implementation attacks such as side-channel attacks. Power-analysis attacks are typical examples of side-channel attacks, that have been demonstrated to be effective against implementations without special countermeasures. The flexibility of FPGAs is an important advantage in real applications but also in lab environments. It is therefore natural to use FPGAs to assess the vulnerability of hardware implementations to power-analysis attacks. To our knowledge, this paper is the first to describe a setup to conduct power-analysis attacks on FPGAs. We discuss the design of our hand-made FPGA-board and we provide a first characterization of the power consumption of a Virtex 800 FPGA. Finally we provide strong evidence that implementations of elliptic curve cryptosystems without specific countermeasures are indeed vulnerable to simple power-analysis attacks.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
EditorsColin D. Walter, Cetin K. Koc, Christof Paar
PublisherSpringer Verlag
Pages35-50
Number of pages16
ISBN (Print)3540408339, 9783540408338
DOIs
Publication statusPublished - 2003
Externally publishedYes

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2779
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Keywords

  • Elliptic Curve Cryptosystems
  • FPGA
  • Power Analysis

Fingerprint

Dive into the research topics of 'Power-analysis attacks on an FPGA - First experimental results'. Together they form a unique fingerprint.

Cite this