Skip to Main content Skip to Navigation
Conference papers

Shall we trust WDDL?

Abstract : Security is not only a matter of cryptographic algorithms robustness but becomes also a question of securing their implementation. P. Kocher's Differential Power Analysis (DPA) is one of the many side-channel attacks that are more and more studied by the security community. Indeed, side-channel attacks (SCA) have proved to be very powerful on cryptographic algorithms such as DES and AES, customarily implemented in a wide variety of devices, ranging from smart-cards or ASICs to FPGAs. Among the proposed countermeasures, the ``dual-rail with precharge logic'' (DPL) aims at hiding information leaked by the circuit by making the power consumption independent of the calculation. However DPL logic could be subject to second order attacks exploiting timing difference between dual nets. In this article, we characterize by simulation, the vulnerability due to timing unbalance in the eight DES substitution boxes implemented in DPL WDDL style. The characterization results in a classification of the nodes according to their timing unbalance. Our results show that the timing unbalance is a major weakness of the WDDL logic, and that it could be used to retrieve the key using a DPA attack. This vulnerability has been experimentally observed on a full DES implementation using WDDL style for Altera Stratix EP1S25 FPGA.
Document type :
Conference papers
Complete list of metadata

Cited literature [6 references]  Display  Hide  Download

https://hal.archives-ouvertes.fr/hal-00409024
Contributor : Sylvain Guilley Connect in order to contact the contributor
Submitted on : Wednesday, August 5, 2009 - 8:46:18 AM
Last modification on : Thursday, November 18, 2021 - 1:02:05 PM
Long-term archiving on: : Tuesday, June 15, 2010 - 10:05:59 PM

File

sg_trust08.pdf
Files produced by the author(s)

Identifiers

Collections

Citation

Sylvain Guilley, Sumanta Chaudhuri, Laurent Sauvage, Tarik Graba, Jean-Luc Danger, et al.. Shall we trust WDDL?. Future of Trust in Computing, Jun 2008, Berlin, Germany. pp.208-215, ⟨10.1007/978-3-8348-9324-6_22⟩. ⟨hal-00409024⟩

Share

Metrics

Record views

352

Files downloads

1230