Abstract—At present, encryption hardware handling confidential information of integrated circuit (IC) cards or the similar are widely available. Confidential information is protected by encryption algorithms, and its safety is computationally secured. However, the problem of power analysis attacks has been actualized. Power analysis attacks acquire confidential information based on information of power consumption leaked from cryptographic circuits that are embedded in hardware. Therefore, when designing cryptographic circuits, resistance against side-channel attacks must be evaluated. The present study proposes a method to verify the resistance including power supply environment. The present study also verifies the validity of the proposed method through several evaluation experiments.
Index Terms—Vulnerability evaluation, Power analysis attack, Cryptographic circuit, Hardware security
The authors are with Meijo university, Japan (e-mail: email@example.com).
Cite: Masaya Yoshikawa and Toshiya Asai, "Vulnerability Evaluation Method Considering Power Supply Environment for Power Analysis Attacks," International Journal of Future Computer and Communication vol. 1, no. 2, pp. 121-123, 2012.