This document discusses differential power analysis (DPA) attacks against cryptographic devices. It begins with background on side-channel attacks in general and then defines simple power analysis and differential power analysis attacks specifically. It describes the stages of a typical DPA attack, including device instrumentation to collect power traces, prediction and selection functions to group traces, averaging traces in subsets, and evaluating the results to extract secrets. An example DPA attack on a FPGA decrypting triple DES is given. Finally, common countermeasures like balancing and masking are outlined to prevent leakage of secrets via power analysis.