Utility analysis and evaluation method study of side channel information

2013 ◽  
Vol 30 (5) ◽  
pp. 500-508
Author(s):  
Yingjian Yan ◽  
Jingchao Yu ◽  
Pengfei Guo ◽  
Jianfei Guo
2014 ◽  
Vol 513-517 ◽  
pp. 1221-1226
Author(s):  
Bo Tao Zhu ◽  
Xiao Xiao Liu ◽  
Jun Steed Huang Huang ◽  
Zu Jue Chen

This paper proposes a statistical coding methodology using covert side channel information to solve timing packet security issue, the main purpose here is to enhance the security of the timing protocol with backward compatible capability. In wireless communications, either ad-hoc military/ industrial network, or LTE/ LTE-A networks, GPS is used to provide time and location; however, the hackers often trying to spoof the signal. The alternative way of providing such signal is using protocols like IEEE1588 Precision Time Protocol (PTP); unfortunately, current timing packet is not encrypted, it can be altered by the hackers. To maintain the simplicity of such protocols, most vendors are reluctant to add encryption on top of it; nevertheless, the end customer wishes to see it. To solve this dilemma, we propose a backward compatible solution here. The basic idea is demonstrated using Matlab FFT calculation tool. The future extension using Fractional FFT is also suggested at.


Author(s):  
Koji Asami ◽  
Nene Kushita ◽  
Akemi Hatta ◽  
Minh Tri Tran ◽  
Yoshiro Tamura ◽  
...  

2018 ◽  
Vol 8 (10) ◽  
pp. 1898 ◽  
Author(s):  
Yang Li ◽  
Momoka Kasuya ◽  
Kazuo Sakiyama

Various electronic devices are increasingly being connected to the Internet. Meanwhile, security problems, such as fake silicon chips, still exist. The significance of verifying the authenticity of these devices has led to the proposal of side-channel authentication. Side-channel authentication is a promising technique for enriching digital authentication schemes. Motivated by the fact that each cryptographic device leaks side-channel information depending on its used secret keys, cryptographic devices with different keys can be distinguished by analyzing the side-channel information leaked during their calculation. Based on the original side-channel authentication scheme, this paper adapts an ID-based authentication scheme that can significantly increase the authentication speed compared to conventional schemes. A comprehensive study is also conducted on the proposed ID-based side-channel authentication scheme. The performance of the proposed authentication scheme is evaluated in terms of speed and accuracy based on an FPGA-based AES implementation. With the proposed scheme, our experimental setup can verify the authenticity of a prover among 2 70 different provers within 0.59 s; this could not be handled effectively using previous schemes.


Sign in / Sign up

Export Citation Format

Share Document