Applying Thermal Side-Channel Attacks on Asymmetric Cryptography

نویسندگان

چکیده

Side-channel attacks (SCAs) are powerful that could be used to retrieve keys from electronic devices. Several physical leakage sources can exploited in SCAs, such as power, time, heat, and so on. Heat is one of the side-channels not frequently analyzed by attackers literature due high noise associated with thermal traces. This article investigates practicality adapting power-based SCAs [i.e., correlation power analysis (CPA) deep-learning-based (DL-based PA)] for refer them attack (CTA) DL-based TA). In addition, we introduce a new called progressive CTA (PCTA). We evaluate different against an unprotected protected software implementation Rivest–Shamir–Adleman (RSA). Our results show three (i.e. CTA, TA, PCTA) 100% key recovery realized.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Side channel attacks in code-based cryptography

The McEliece and the Niederreiter public key cryptosystems (PKC) are supposed secure in a post quantum world [4] because there is no efficient quantum algorithm for the underlying problems upon which these cryptosystems are built. The CFS, Stern and KKS signature schemes are post-quantum secure because they are based on hard problems of coding theory. The purpose of this article is to describe ...

متن کامل

Improved Side Channel Attacks on Pairing Based Cryptography

Several known invasive and non-invasive attacks against pairing algorithms only work if the second but not if the rst argument of the pairing is the secret. In this paper we extend some of these attacks to the case where the rst argument is the secret. Hence we conclude that positioning the secret as the rst argument of the pairing does not necessarily improve the security against side channel ...

متن کامل

Improving Side-Channel Attacks Against Pairing-Based Cryptography

Although the vulnerability of pairing-based algorithms to side-channel attacks has been demonstrated—pairing implementations were targeted on three different devices in a recent paper [41]—it nevertheless remains difficult to choose an adapted leakage model and detect points of interest. Our proposed approach evaluates the parameters of the attack and validates the data processing workflow. We ...

متن کامل

Side channel parameter characteristics of code injection attacks

Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Very Large Scale Integration Systems

سال: 2021

ISSN: ['1063-8210', '1557-9999']

DOI: https://doi.org/10.1109/tvlsi.2021.3111407