This paper firstly declares the principle of the Differential Power Analysis(DPA) attack technology,and shows the vulnerability for power analysis attack straightforward AES.
As the partitioning criterions of single-bit and multi-bit differential power analysis(DPA) are usually abstract and simple,these two DPA methods can not retrieve any useful information even with 6000 power measurements.
By using power analysis tool Simplepower,analysis was made to evaluate the security level of montgomery scalar multiplication on elliptic curve cryptography(ECC) when it was attacked by simple power analysis(SPA) and differential power analysis(DPA).
Based on the research on its property,this paper uses the conception of transparency order as the target to measure the resistance to Differential Power Analysis(DPA),and educes a formula to calculate the lower boundary of transparency order of high-nonlinear function.
The paper introduces Differential Power Analysis(DPA) attack of the decrypt encrypted circuits with DES is one particularly powerful type of Side Channel Attacks(SCA).
针对DES(Data Encryption Standard)加密电路,采用了差分功耗分析(Differential Power Analysis,DPA)攻击方式进行解密。
The differential power analysis(DPA) attacks against the data encryption standard(DES) crystographic system realized with AT89C52 microcomputer were designed and implemented.