Tuesday, April 30, 2019

Side Channel Attacks Essay Example | Topics and Well Written Essays - 3750 words

Side Channel Attacks - Essay showcase chow chow and Feng (2011) observed that cryptographic devices somatogenic attacks tends to take advantage of implementation-specific features to convalesce the secrete considerations factored in during computation. As a result, they are much less general because they are specific to a particular implementation, and rather more powerful than classical cryptanalysis that is normally perceived to be very drab by cryptographic device manufacturers, according to Zhou and Feng (2011). There are usually numerous such(prenominal) physical attacks, which falls under two broad categories namely invasive vs. non-invasive attacks and active vs. passive attacks. encroaching(a) attacks, according to Zhou and Feng (2011) need de-packaging of the chip in order to have direct access to the components deep down it. A classical example of invasive attack can be a wire tie-in onto a data bus to be able to view the data transfers (Bao et al., 2011). A non-inva sive attack, on the otherwise hand, only uses breeding available externally, such as power consumption and running time, according to Zhou and Feng (2011). ... Therefore, the side-channel attacks that this paper seeks to explore are a form of physical attacks where an adversary attempts to exploit the leakages of physical information such as power consumption, timing information, or electromagnetic radiation. Skorobogatov (2011) defines side-channel attacks as any form of physical attack based on information obtained from the physical implementation of a cryptosystem, but not savage force in the algorithms. Skorobogatov (2011) reveals that side-channel attacks pertain to measuring changeability of hardware and analyzing the behavior of the algorithm that runs the hardware in question. However, since the information leakages resulting from side-channel attacks are passive, non-invasive and can easily be performed using cheap equipment, they pose danger to the protection of crypto graphic hardware devices, according to Skorobogatov (2011). The cryptographic devices include among other things personal computers, smart cards, and radio absolute frequency identification devices (RFIDs) among others. Their proliferation has made the physical security and side-channel attacks a major concern that need to be examines in details (Bidgoli, 2006). This paper will begin by examining the basics of side-channel attacks. Among the issues discussed in this section, include the genesis of accidental information leakages in latest microelectronic technologies and how the physical features can be recovered using a simple measurement setups. This will be followed by an exploration of some of the typical examples of side-channel attacks such as the differential power analysis (DPA) and simple power analysis (SPA).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.