Skip to main content

Advertisement

Springer Nature Link
Log in
Menu
Find a journal Publish with us Track your research
Search
Saved research
Cart
  1. Home
  2. Cryptographic Hardware and Embedded Systems – CHES 2005
  3. Conference paper

On Second-Order Differential Power Analysis

  • Conference paper
  • pp 293–308
  • Cite this conference paper
Cryptographic Hardware and Embedded Systems – CHES 2005 (CHES 2005)
On Second-Order Differential Power Analysis
  • Marc Joye18,
  • Pascal Paillier19 &
  • Berry Schoenmakers20 

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3659))

Included in the following conference series:

  • International Workshop on Cryptographic Hardware and Embedded Systems
  • 3871 Accesses

  • 100 Citations

  • 3 Altmetric

Abstract

Differential Power Analysis (DPA) is a powerful cryptanalytic technique aiming at extracting secret data from a cryptographic device by collecting power consumption traces and averaging over a series of acquisitions. In order to prevent the leakage, hardware designers and software programmers make use of masking techniques (a.k.a. data whitening methods). However, the resulting implementations may still succumb to second-order DPA. Several recent papers studied second-order DPA but, although the conclusions that are drawn are correct, the analysis is not.

This paper fills the gap by providing an exact analysis of second-order DPA as introduced by Messerges. It also considers several generalizations, including an extended analysis in the more general Hamming-distance model.

The work described in this paper has been supported in part by the European Commission through the IST Programme under Contract IST-2002-507932 ECRYPT.

Download to read the full chapter text

Chapter PDF

Similar content being viewed by others

Practical Session: Differential Power Analysis for Beginners

Chapter © 2017

White-Box Cryptography: Don’t Forget About Grey-Box Attacks

Article 12 February 2019

A Novel Solution for DPA Resistant Implementation of Cryptographic Cores

Chapter © 2026

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Abstract Harmonic Analysis
  • Cryptology
  • Logical Analysis
  • Fourier Analysis
  • Power law
  • Special Functions
  • Side-Channel Attack Analysis in Cryptographic Systems

References

  1. Triangle of coefficients of Gandhi polynomials. In: On-Line Encyclopedia of Integer Sequences, http://www.research.att.com/projects/OEIS?Anum=A036970

  2. Triangle of coefficients of a companion polynomial to the Gandhi polynomial. In: On-Line Encyclopedia of Integer Sequences, http://www.research.att.com/projects/OEIS?Anum=A083061

  3. Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM Side-Channel(s). In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 29–45. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  4. Boros, G., Moll, V.: Irresistible Integrals: Symbolics, Analysis and Experiments in the Evaluation of Integrals. Cambridge University Press, Cambridge (2004)

    Book  MATH  Google Scholar 

  5. Brier, É., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Coron, J.-S., Goubin, L.: On Boolean and arithmetic masking against differential power analysis. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 231–237. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  7. Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: Concrete results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 251–261. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  8. Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)

    Google Scholar 

  9. Joye, M.: Smart-card implementations of elliptic curve cryptography and DPA-type attacks. In: Smart Card Research and Advanced Applications VI, pp. 115–125. Kluwer Academic Publishers, Dordrecht (2004)

    Chapter  Google Scholar 

  10. Knuth, D.E.: The Art of Computer Programming, 3rd edn. Fundamental Algorithms, vol. 1. Addison Wesley, Reading (1997)

    Google Scholar 

  11. Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)

    Google Scholar 

  12. Messerges, T.S.: Using second-order power analysis to attack DPA resistant software. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 238–251. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  13. Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 51(5), 541–552 (2002)

    Article  MathSciNet  Google Scholar 

  14. Quisquater, J.-J., Samyde, D.: ElectroMagnetic Analysis (EMA): Measures and couter-measures for smard cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200–210. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  15. Rivest, R.L., Robshaw, M.J.B., Sideney, R., Yin, Y.L.: The RC6 block cipher. RSA Laboratories, v1.1, August 20 (1998)

    Google Scholar 

  16. Waddle, J., Wagner, D.: Towards efficient second-order power analysis. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 1–15. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. CIM-PACA, Centre de Micro-électronique de Provence – George Charpak, Avenue des Anénomes, Quartier Saint Pierre, 13120, Gardanne, France

    Marc Joye

  2. Advanced Research and Security Centre, Gemplus S.A., 34 rue Guynemer, 92447, Issy-les-Moulineaux, France

    Pascal Paillier

  3. Dept of Mathematics and Computing Science, Eindhoven University of Technology, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands

    Berry Schoenmakers

Authors
  1. Marc Joye
    View author publications

    Search author on:PubMed Google Scholar

  2. Pascal Paillier
    View author publications

    Search author on:PubMed Google Scholar

  3. Berry Schoenmakers
    View author publications

    Search author on:PubMed Google Scholar

Editor information

Editors and Affiliations

  1. IBM Watson Research Center, P.O. Box 704, NY 10598, Yorktown Heights, USA

    Josyula R. Rao

  2. Cryptography & Information Security Laboratory, WPI, Worcester, MA, USA

    Berk Sunar

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Joye, M., Paillier, P., Schoenmakers, B. (2005). On Second-Order Differential Power Analysis. In: Rao, J.R., Sunar, B. (eds) Cryptographic Hardware and Embedded Systems – CHES 2005. CHES 2005. Lecture Notes in Computer Science, vol 3659. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11545262_22

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/11545262_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28474-1

  • Online ISBN: 978-3-540-31940-5

  • eBook Packages: Computer ScienceComputer Science (R0)Springer Nature Proceedings Computer Science

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Side-channel analysis
  • differential power analysis
  • second-order attacks

Publish with us

Policies and ethics

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Footer Navigation

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover

Corporate Navigation

  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

162.0.217.198

Not affiliated

Springer Nature

© 2026 Springer Nature