[2818] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

jcaldwel@iquest.net: FW: Announce: Differential Power Analysis

daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Sat Jun 20 01:23:07 1998

To: cryptography@c2.net
Date: Sat, 20 Jun 1998 01:21:29 -0400
From: "Perry E. Metzger" <perry@piermont.com>


Originally forwarded from Usenet to coderpunks by jcaldwel@iquest.net:

Subject: Announce: Differential Power Analysis
Date: 19 Jun 1998 15:42:32 -0700
From: pck@netcom.com (Paul C. Kocher)
Organization: Netcom
Newsgroups: sci.crypt, sci.crypt.research




I've posted some preliminary information about Differential
Power Analysis (DPA) at http://www.cryptography.com/dpa.
In short, DPA is an attack that finds keys from information
collected from monitoring the power consumption of smartcards
and other crypto hardware.  We have implemented the attack
against a large number of actual devices and are not currently
aware of any commercially-available crypto smartcards that are
not susceptable to power analysis attacks.
 
-- Paul
 
_____________________________________________________________________
Paul Kocher                                870 Market St., Suite 1088
President, Cryptography Research              San Francisco, CA 94102
Tel: 415-397-0123 (FAX: -0127)            http://www.cryptography.com


home help back first fref pref prev next nref lref last post