Utilizing Random Noise in Cryptography: Where is the Tofu?


With the massive deployment of mobile devices and sensor networks, resistance against side-channel attacks in cryptographic systems has become an active research topic in recent years. While various security measures exist in literature, most of them are deterministic in nature, where the same input plaintext always results in the same power trace with a given key. Thus, attackers can still aggregate the small deviations between the power traces to identify the correct key. Towards this, random dynamic voltage scaling has been proposed in the literature, which is demonstrated to be effective against Differential Power Analysis (DPA). In this paper, we evaluate this approach, along with the expanded feature of spatial randomness, to resist Correlation Power Analysis (CPA).

Meeting Name

IEEE/ACM Conference on Computer-Aided Design: ICCAD (2012: Nov. 5-8, San Jose, CA)


Electrical and Computer Engineering

Keywords and Phrases

Cryptographic Systems; Differential Power Analysis; Massive Deployment; Plaintext; Power Analysis; Power Traces; Random Dynamics; Random Noise; Research Topics; S-Box; Security Measure; Side Channel Attack; Computer Aided Design; Mobile Devices; Sensor Networks; Voltage Stabilizing Circuits; Cryptography; Correlation Power Analysis; Random Dynamic Voltage Scaling

International Standard Book Number (ISBN)


International Standard Serial Number (ISSN)

1092-3152; 1558-2434

Document Type

Article - Conference proceedings

Document Version


File Type





© 2012 Institute of Electrical and Electronics Engineers (IEEE), All rights reserved.

Publication Date

01 Nov 2012

This document is currently not available here.