Efficient Electromagnetic Analysis Based on Side-channel Measurement Focusing on Physical Structures

Author(s):  
Shinpei Wada ◽  
Youngwoo Kim ◽  
Daisuke Fujimoto ◽  
Yuichi Hayashi ◽  
Naofumi Homma
2012 ◽  
Vol 6-7 ◽  
pp. 200-204
Author(s):  
Jian Bo Yao ◽  
Tao Zhang

Side-channel attack is a non destructive physical attacks method. In view of existing cryptosystem of Side-channel leakage of safe hidden trouble, this paper presents a kind of self-healing properties with the cryptosystem design method. Firstly, a new masking method is proposed, and it restricts the side channel measurement by inserting some measure-disabled points into the cryptographic algorithm. And then, a masking update technique is applied for making the side-channel leakage invalid. Compared with previous countermeasures, our method has stronger ability of self-healing and it also resists to complex side-channel attack.


2021 ◽  
Author(s):  
Nilupulee A. Gunathilake ◽  
Ahmed Al-Dubai ◽  
William J. Buchanan ◽  
Owen Lo

Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, continuous observations of physical leakages are essential to minimise vulnerabilities associated with cryptographic functions. Lightweight cryptography is a novel approach in progress towards internet-of-things (IoT) security. Thus, it would provide sufficient data and privacy protection in such a constrained ecosystem. IoT devices are resource-limited in terms of data rates (in kbps), power maintainability (battery) as well as hardware and software footprints (physical size, internal memory, RAM/ROM). Due to the difficulty in handling conventional cryptographic algorithms, lightweight ciphers consist of small key sizes, block sizes and few operational rounds. Unlike in the past, affordability to perform side-channel attacks using inexpensive electronic circuitries is becoming a reality. Hence, cryptanalysis of physical leakage in these emerging ciphers is crucial. Among existing studies, power analysis seems to have enough attention in research, whereas other aspects such as electromagnetic, timing, cache and optical attacks continue to be appropriately evaluated to play a role in forensic analysis. As a result, we started analysing electromagnetic emission leakage of an ultra-lightweight block cipher, PRESENT. According to the literature, PRESENT promises to be adequate for IoT devices, and there still seems not to exist any work regarding correlation electromagnetic analysis (CEMA) of it. Firstly, we conducted simple electromagnetic analysis in both time and frequency domains and then proceeded towards CEMA attack modelling. This paper provides a summary of the related literature (IoT, lightweight cryptography, side-channel attacks and EMA), our methodology, current outcomes and future plans for the optimised results.


2015 ◽  
Vol 135 (9) ◽  
pp. 515-521
Author(s):  
Yu-ichi Hayashi ◽  
Naofumi Homma ◽  
Takaaki Mizuki ◽  
Takafumi Aoki ◽  
Hideaki Sone

2012 ◽  
Vol 132 (1) ◽  
pp. 9-12
Author(s):  
Yu-ichi Hayashi ◽  
Naofumi Homma ◽  
Takaaki Mizuki ◽  
Takafumi Aoki ◽  
Hideaki Sone

2004 ◽  
Vol 124 (2) ◽  
pp. 321-326 ◽  
Author(s):  
Toshie Takeuchi ◽  
Takafumi Nakagawa ◽  
Mitsuru Tsukima ◽  
Kenichi Koyama ◽  
Nobumoto Tohya ◽  
...  

2012 ◽  
Vol 132 (7) ◽  
pp. 684-689 ◽  
Author(s):  
Md. Raju Ahmed ◽  
Masaru Ishii

Author(s):  
Daisuke FUJIMOTO ◽  
Toshihiro KATASHITA ◽  
Akihiko SASAKI ◽  
Yohei HORI ◽  
Akashi SATOH ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document