Side Channel Attacks on the Embedded System

作者: Catherine H. Gebotys

DOI: 10.1007/978-1-4419-1530-6_8

关键词:

摘要: Design for security not only involves the design of functions which meet price, performance, power, and other constraints, but also resistance to attacks. An attack may be successful in extracting secret key solely from side channel signals recorded a device executing cryptographic algorithm. In many cases plaintext an encryption algorithm additionally required by attacker (known attack) or have controlled (chosen attack). some knowledge ciphertext (ciphertext along with sufficient attack. This chapter will introduce following discuss techniques.

参考文章(30)
Stefan Mangard, Elisabeth Oswald, Thomas Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security) Springer-Verlag New York, Inc.. ,(2007)
Francois-Xavier Standaert, Bart Preneel, Siddika Berna Örs, Power Analysis of an FPGA Implementation of Rijndael: Is Pipelining a DPA Countermeasure? cryptographic hardware and embedded systems. ,vol. 3156, pp. 30- 44 ,(2004)
Paul N. Fahn, Peter K. Pearson, IPA: A New Class of Power Attacks cryptographic hardware and embedded systems. pp. 173- 186 ,(1999) , 10.1007/3-540-48059-5_16
Karine Gandolfi, Christophe Mourtel, Francis Olivier, Electromagnetic Analysis: Concrete Results cryptographic hardware and embedded systems. ,vol. 2162, pp. 251- 261 ,(2001) , 10.1007/3-540-44709-1_21
Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, Pankaj Rohatgi, The EM Side-Channel(s) cryptographic hardware and embedded systems. pp. 29- 45 ,(2002) , 10.1007/3-540-36400-5_4
Emmanuelle Dottax, Vincent Carlier, Hervé Chabanne, Hervé Pelletier, Electromagnetic Side Channels of an FPGA Implementation of AES. IACR Cryptology ePrint Archive. ,vol. 2004, pp. 145- ,(2004)
Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Multi-channel Attacks cryptographic hardware and embedded systems. pp. 2- 16 ,(2003) , 10.1007/978-3-540-45238-6_2