Marek Repka

Work place: Faculty of Electrical Engineering and Information Technology/Institute of Computer Science and Mathematics, Bratislava, SK-812 19, Slovak Republic

E-mail: marek.repka@stuba.sk

Website:

Research Interests: Computer Architecture and Organization, Application Security, Hardware Security, Information Security, Network Security

Biography

Marek Repka was born in Czech Republic in 1985. He has been studying at the Institute of Computer Science and Mathematics - FEI STUBA in Bratislava, Slovak Republic, since 2005. He achieved master degree in the applied informatics field focused on security of information systems. Since 2010, he has been studying PhD. at the institute in the field, mainly focused on side-channel-analyses of cryptosystems.

He is Information Security Professional focused mainly on Side-Channel-Analysis of cryptosystems, Application Security, and Implementation and Integration of Security Controls, working for TEMPSET, a.s. Company in Bratislava in Slovakia. In his field he published the chapter ‘Cryptography Based on Error Correcting Codes: A Survey’ in the Book ‘Multidisciplinary Perspectives in Cryptology and Information Security’ published by IGI Global, 2004; and the journal paper ‘McEliece PKC Calculator’ in the Journal of Electrical Engineering Vol. 65, No. 6, 2014.

Mr. Repka won National Stipendium, in 2011, provided by National Scholarship Programme of SR – SAIA, n. o.

Author Articles
Correlation Power Analysis using Measured and Simulated Power Traces based on Hamming Distance Power Model – Attacking 16-bit Integer Multiplier in FPGA

By Marek Repka Michal Varchola

DOI: https://doi.org/10.5815/ijcnis.2015.06.02, Pub. Date: 8 May 2015

In many cases side channel attacks complexity are estimated by considering attack simulations only. Regarding this estimations, parameters of cryptographic devices are set so the attack is infeasible. This work shows that this approach to secure cryptographic equipment can be dangerous because real attacks can be much better than expected according to simulations. This observation is presented on very generic Correlation Power Attack using Hamming Distance Power Model. This attack is aimed against integer multiplier implemented in FPGA. In cryptography, an integer multiplier power consumption can sometimes be exploited to reveal a secret. Very often it is in asymmetric cryptography that is used in PKI as a fundamental building block. As an example, there are DSA and its various derivations.

[...] Read more.
Other Articles