Digital protection system against current consumption attacks
Main Article Content
Abstract
The article presents the new protection system for microcontroller by the supply current. The modeling was provided, and the effectiveness of the system while detecting the parts of algorithms is prooved
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
References
A. Moroz, “Significant level of theft software support for microcontrollers for the method of analysis of the struma”, Electronics and communications, no. 1-2, pp. 238–241, 2008.
A.V. Moroz and T.O. Tereshchenko, “Research on the security of microcontroller software by current consumption”, Technical Electrodynamics, pp. 99–102, 2008.
P. Kocher, J. Jaffe, and B. Jun, “Differential Power Analysis”, in Advances in Cryptology — CRYPTO’ 99: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15–19, 1999 Proceedings, Berlin, Heidelberg: Springer Berlin Heidelberg, 1999, pp. 388–397. DOI:10.1007/3-540-48405-1_25
Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, and Mohammad T. Manzuri Shalmani. “Physical Cryptanalysis of KeeLoq Code Hopping Applications”. Ruhr University of Bochum, Germany. http://eprint.iacr.org/2008/058.pdf
WO 02/09030, 31.01.2002. Data-processing arrangement comprising confidential data. PAUTOT, Fabrice.
US 6419159 USA, 16.07.2002, Integrated Circuit Device With Power Analysis Protection Circuitry, Odinak G.
US 6748535 USA,8.01.2004. System and method for suppressing conducted emission by a cryptographic device comprising an integrated circuit. F.W. Ryan, M.A. Weiant, E.J. Twarog
US 6848619 USA, 1.02.2005. Microcontroller protected against power attack, R. Leydier
US 2002/0010872 USA, 24.01.2002, Data carrier for the adaptation of a consumption time interval to the power consumption of the data carrier, P. Thueringer, K. Ully, M. Feuser
EP 1113386 Europe, 12/23/2000, Protecting smart cards from power analysis with detached power supplies. Shamir, A. Rehovot



