Michal Varchola

Work place: Faculty of Electrical Engineering and Informatics / Department of Electronics and Multimedia Communications, Kosice, 04120, Slovak Republic

E-mail: michal@varchola.com

Website:

Research Interests: Computer systems and computational processes, Embedded System, Systems Architecture, Information Systems

Biography

Michal Varchola Michal Varchola was born in Slovak Republic in 1984. He received PhD degree in info-electronics, from Technical University of Kosice, Slovak Republic in 2010.

He works as young researcher at Technical University of Kosice from 2010. His main fields of interests are: side channel analysis of cryptographic devices, true random number generators, implementation and integration of FPGA and MCU embedded systems and digital signal processing. He published book “Cryptographic True Random Number Generator with Malfunction detector”, Saarbrucken, Germany: Lambert Academic Publishing, 2011. He is also author of two patents aiming true random generators and physical unclonable functions.

Mr. Varchola is member of International Association for Cryptologic Research and he received research project dean's award in 2014.

Author Articles
Correlation Power Analysis using Measured and Simulated Power Traces based on Hamming Distance Power Model – Attacking 16-bit Integer Multiplier in FPGA

By Marek Repka Michal Varchola

DOI: https://doi.org/10.5815/ijcnis.2015.06.02, Pub. Date: 8 May 2015

In many cases side channel attacks complexity are estimated by considering attack simulations only. Regarding this estimations, parameters of cryptographic devices are set so the attack is infeasible. This work shows that this approach to secure cryptographic equipment can be dangerous because real attacks can be much better than expected according to simulations. This observation is presented on very generic Correlation Power Attack using Hamming Distance Power Model. This attack is aimed against integer multiplier implemented in FPGA. In cryptography, an integer multiplier power consumption can sometimes be exploited to reveal a secret. Very often it is in asymmetric cryptography that is used in PKI as a fundamental building block. As an example, there are DSA and its various derivations.

[...] Read more.
Other Articles