[2818] in cryptography@c2.net mail archive
jcaldwel@iquest.net: FW: Announce: Differential Power Analysis
daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Sat Jun 20 01:23:07 1998
To: cryptography@c2.net
Date: Sat, 20 Jun 1998 01:21:29 -0400
From: "Perry E. Metzger" <perry@piermont.com>
Originally forwarded from Usenet to coderpunks by jcaldwel@iquest.net:
Subject: Announce: Differential Power Analysis
Date: 19 Jun 1998 15:42:32 -0700
From: pck@netcom.com (Paul C. Kocher)
Organization: Netcom
Newsgroups: sci.crypt, sci.crypt.research
I've posted some preliminary information about Differential
Power Analysis (DPA) at http://www.cryptography.com/dpa.
In short, DPA is an attack that finds keys from information
collected from monitoring the power consumption of smartcards
and other crypto hardware. We have implemented the attack
against a large number of actual devices and are not currently
aware of any commercially-available crypto smartcards that are
not susceptable to power analysis attacks.
-- Paul
_____________________________________________________________________
Paul Kocher 870 Market St., Suite 1088
President, Cryptography Research San Francisco, CA 94102
Tel: 415-397-0123 (FAX: -0127) http://www.cryptography.com