A countermeasure for EM attack of a wireless PDA

Future wireless embedded systems will be increasingly powerful, supporting many more applications including one of the most crucial, security. Although many wireless devices offer more resistance to bus probing and power analysis attacks due to their compact size, susceptibility to electromagnetic (EM) attacks must be analyzed. This paper demonstrates, for the first time, a real EM attack on a PDA. A new low energy countermeasure and a new first order differential frequency analysis (DFA) is presented. Real energy measurements are also used to compare the energy overheads of different countermeasures. Results show that the low energy countermeasure thwarts first order differential analysis without large overheads of table regeneration or excessive storage. With the emergence of security applications in PDAs, cellphones, etc., low energy countermeasures for resistance to DFA are crucial for supporting future secure wireless embedded systems.

[1]  Jovan Dj. Golic,et al.  Multiplicative Masking and Power Analysis of AES , 2002, CHES.

[2]  Francis Olivier,et al.  Electromagnetic Analysis: Concrete Results , 2001, CHES.

[3]  Kouichi Itoh,et al.  DPA Countermeasure Based on the "Masking Method" , 2001, ICISC.

[4]  Lei He,et al.  Leakage power modeling and reduction with data retention , 2002, ICCAD 2002.

[5]  Paul Douglas,et al.  Proceedings International Conference on Information Technology: Coding and Computing , 2002, Proceedings. International Conference on Information Technology: Coding and Computing.

[6]  Pankaj Rohatgi,et al.  Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.

[7]  Paul Dischamp,et al.  Power Analysis, What Is Now Possible , 2000, ASIACRYPT.

[8]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[9]  David A. Wagner,et al.  Towards Efficient Second-Order Power Analysis , 2004, CHES.

[10]  Dakshi Agrawal,et al.  The EM Side-Channel(s) , 2002, CHES.

[11]  Brian R. Gladman A Specification for Rijndael, the AES Algorithm , 2001 .

[12]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[13]  Anand Raghunathan,et al.  Securing wireless data: system architecture challenges , 2002, 15th International Symposium on System Synthesis, 2002..

[14]  Louis Goubin,et al.  DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.

[15]  Thomas S. Messerges,et al.  Using Second-Order Power Analysis to Attack DPA Resistant Software , 2000, CHES.

[16]  Thomas S. Messerges,et al.  Securing the AES Finalists Against Power Analysis Attacks , 2000, FSE.