Explanation of DPA: Differential Power Analysis (from the paper of Kocher et al)

preview_player
Показать описание
This is an explanation of the Kocher et al paper on Differential Power Analysis.

errata 1: DPA and SPA are non-invasive

errata 2: In last round of DES, the left and right halves don't get exchanged

Рекомендации по теме
Комментарии
Автор

Bought your book when it was still in MEAP. I appreciate all you do. Helping us keep networks secure and explaining extremely complex topics to folks.

pstewart
Автор

Reading the preface of your book. Can’t skip the video link. Feel the great journey is beginning:)

bushkov
Автор

The first good explanation I found. In the lecture I heard, it was explained totally wrong.... Thank you very much!!!

alexmattheis
Автор

Thank you, really a great explanation that probably saved me hours of trying to understand that paper

flfloful
Автор

Bonjour David! I am currently studying for my Hardware Security exam tomorrow, thank youuuu for this!!! The animation look just fine!

farisfikrirusli
Автор

Very good explanations 😊. I had to watch 2 times but I finally understood. I was stuck on this point.

thank you so much

simongoisse
Автор

Just started reading your book.
Came to this video as this it was mentioned in your book preface.
I literally keyed in the YouTube id to search for this video lol! May be print books should have QR code to web links :)

thyagtubes
Автор

very good! thanks! from japan🇯🇵 your are my god! wonderful!

cocet
Автор

In last round of DES, the left and right halves don't get exchanged. Still, a great video.

Badalmurmu
Автор

Hi great video. Just wanted to ask (7:14min) why do people go for probing at the cyphertext only? can I probe into the output bit of the feistel block directly without going through the XOR gate all the way to cyphertext, because anyway i can use that bit as my divider function to divide between the power traces and do the whole thing? [I wanted to avoid the XOR path to reduce the noise]

joydeepkr.devnath
Автор

So how are traces divided into 0's and 1's? how can they be differentiated? Does that have to do with spike in each trace(power consumed)?

ratandeep
Автор

The preface of your book brought me here.

saksi_mata
Автор

You are the hero that we needed! Thanks so much for the video its help me a lot. Just one observation at 12:30: don't you have to consider the first permutation on the original key that came before the schedule part?

gustavoadolfoschwantzolive
Автор

Thank you very much!! It was really helpful and much needed for my project

somyasharma
Автор

Very good job! David, first of all I should say thank you. You explained the TDES clearly and i have understood more from your clip. However, according to the screen at 5:43, the input plaintext data was permuted and separated into L1 and R1. Then a F function was performed on the R1 using K1. That is no problem. Then, move to time = 5:48. Are they L16 and R16 on the top? 'cos I may found they were L15 and R16 there.

xnigel
Автор

At 8:49 when you are explaining about Sorting in two groups (1's and 0's) you say we use Selection function with Cipher text, do you mean we XOR Cipher text with Selection function ?

udaypatil
Автор

David, wonderful explanation, and the animation is simply great and definitely helped in the understanding.  You could not have done it anymore better.
Since you mentioned earlier that you could not find any material on the DPA (yours is still most certainly welcome), below is a link for another view on DPA (it is from a class and is a bit long though, but the presenter gets to DPA hands-on within 10 mins into the story):

Thanks again.

sathyamurthisadhasivan
Автор

hey thank you for the vidéo but could u explain to US how dpa attacks works on AES cuz it s more complicated than DES plz i really need an explanation with exemples if u could🙂

foufounafoufi