Physical side-channel attacks on cryptographic systems
نویسنده
چکیده
We survey a number of attacks on cryptographic systems which depend on measuring physical characteristics of such systems whilst a given cryptographic operation is carried out. Such measurements could include the time needed to perform certain operations, the power consumed or any electromagnetic radiation produced. As such the physical measurement is producing a side-channel for the cryptographic system which leaks information about the internal secret key. We also describe a number of the countermeasures that have been proposed in the literature.
منابع مشابه
A Statistics-based Fundamental Model for Side-channel Attack Analysis
Side-channel attacks (SCAs) exploit leakage from the physical implementation of cryptographic algorithms to recover the otherwise secret information. In the last decade, popular SCAs like differential power analysis (DPA) and correlation power analysis (CPA) have been invented and demonstrated to be realistic threats to many critical embedded systems. However, there is still no sound and provab...
متن کاملSide channel parameter characteristics of code injection attacks
Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...
متن کاملSide-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing
Side-channel attacks are easy-to-implement whilst powerful attacks against cryptographic implementations, and their targets range from primitives, protocols, modules, and devices to even systems. These attacks pose a serious threat to the security of cryptographic modules. In consequence, cryptographic implementations have to be evaluated for their resistivity against such attacks and the incor...
متن کاملSide-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testinga
Side-channel attacks are easy-to-implement whilst powerful attacks against cryptographic implementations, and their targets range from primitives, protocols, modules, and devices to even systems. These attacks pose a serious threat to the security of cryptographic modules. In consequence, cryptographic implementations have to be evaluated for their resistivity against such attacks and the incor...
متن کاملSide-Channel Cryptanalysis Lecture notes and suggested reading
Most cryptosystems are designed and evaluated at a mathematical level. Attackers, however, will always target the physical realisation of a system which is much more complicated (see [14] for discussion of this disconnect). Real-world electronic implementations of ciphers will usually leak additional information to attackers in the form of side-channels such as timing, power consumption, electr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Software Focus
دوره 1 شماره
صفحات -
تاریخ انتشار 2000