> At 10:32 AM -0700 9/13/99, Eugene Leitl wrote:
> >Why don't you just erase flash when a pressure change (hull breach) is
> >detected. Using double-walled hull, to look for shortcuts.  You can
> >also couple this to light detection, and whatnot.

Arnold Reinhold said:
> in several places) that would monitor on-chip supply voltage and keep 
> the program from executing sensitive code for some period if dV/dt 
> were too high.  If the cap or Li battery were disconnected, the 

What are you guys talking about?  Differential power analysis doesn't
require any physical attack, nor does it deal with voltage
variations.  (You are probably thinking of Shamir's fault-injection
attacks.)  Differential power analysis measures the current
consumption of the part as it operates, completely outside the device.
It uses statistical techniques to confirm or reject hypotheses about
the key values being operated on in the final rounds of encryption
algorithms.  Paul Kocher's team has developed some countermeasures,
see the end of the technical discussion linked from:

  http://www.cryptography.com/dpa/index.html

        John

Reply via email to