Applying Thermal Side-Channel Attacks on Asymmetric Cryptography
نویسندگان
چکیده
Side-channel attacks (SCAs) are powerful that could be used to retrieve keys from electronic devices. Several physical leakage sources can exploited in SCAs, such as power, time, heat, and so on. Heat is one of the side-channels not frequently analyzed by attackers literature due high noise associated with thermal traces. This article investigates practicality adapting power-based SCAs [i.e., correlation power analysis (CPA) deep-learning-based (DL-based PA)] for refer them attack (CTA) DL-based TA). In addition, we introduce a new called progressive CTA (PCTA). We evaluate different against an unprotected protected software implementation Rivest–Shamir–Adleman (RSA). Our results show three (i.e. CTA, TA, PCTA) 100% key recovery realized.
منابع مشابه
Side channel attacks in code-based cryptography
The McEliece and the Niederreiter public key cryptosystems (PKC) are supposed secure in a post quantum world [4] because there is no efficient quantum algorithm for the underlying problems upon which these cryptosystems are built. The CFS, Stern and KKS signature schemes are post-quantum secure because they are based on hard problems of coding theory. The purpose of this article is to describe ...
متن کاملImproved Side Channel Attacks on Pairing Based Cryptography
Several known invasive and non-invasive attacks against pairing algorithms only work if the second but not if the rst argument of the pairing is the secret. In this paper we extend some of these attacks to the case where the rst argument is the secret. Hence we conclude that positioning the secret as the rst argument of the pairing does not necessarily improve the security against side channel ...
متن کاملImproving Side-Channel Attacks Against Pairing-Based Cryptography
Although the vulnerability of pairing-based algorithms to side-channel attacks has been demonstrated—pairing implementations were targeted on three different devices in a recent paper [41]—it nevertheless remains difficult to choose an adapted leakage model and detect points of interest. Our proposed approach evaluates the parameters of the attack and validates the data processing workflow. We ...
متن کاملSide channel parameter characteristics of code injection attacks
Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Very Large Scale Integration Systems
سال: 2021
ISSN: ['1063-8210', '1557-9999']
DOI: https://doi.org/10.1109/tvlsi.2021.3111407