This paper briefly introduces side channel attacks on cryptographic hardware with special emphasis on differential power analysis
(DPA). Based on existing countermeasures against DPA, design method combining power equalization for synchronous and combinatorial
circuits has been proposed. AES algorithm has been implemented in Xilinx Spartan IIE field programmable gate array (FPGA) device
using the standard and powerequalized methods. Power traces for DPA have been collected using XPower tool. Simulation results show
that standard AES implementation can be broken after N=500 encryptions, while powerequalized counterpart shows no correlation between
power consumption and the cipher key after N=2000 encryptions.
|