Spymasters tools: A comparative approach to side channel attacks
Loading...

Date
2014
Authors
Tugçe Kalkavan
Journal Title
Journal ISSN
Volume Title
Publisher
Curran Associates Inc.
Open Access Color
OpenAIRE Downloads
OpenAIRE Views
Abstract
In many security protocols implementation of cryptographic algorithms can be thought as both software and hardware manner. The security of cryptographic algorithms is threatened by attacking cryptographic implementations. In public cryptography research on side channel attacks started with works of (Kocher et al. 2004 Kocher 1996 Kocher et al. 1999). Side channel attacks is a passive attack which basically depend on collecting information through physically observable phenomenon's created by the execution of computing tasks in microelectronic devices and logical gates in order to break cryptographic algorithms such as timing information proposed in (Kocher 1996 Jean-Fran et al. 2000) power consumption studied in (Kocher et al. 1999) and electromagnetic radiation in (Agrawal et al. 2003).This paper serves as an introduction to basic level of side channel attacks method and techniques used in these attacks and many other countermeasures such as Simple Power Analysis Differential Power Analysis, Data bit Differential Power Analysis against such attacks. © 2023 Elsevier B.V. All rights reserved.
Description
Keywords
Countermeasures Against Side Channel Attacks, Side-channel Attacks, Computing Power, Electromagnetic Waves, Microelectronics, Network Security, Comparative Approach, Countermeasure Against Side Channel Attack, Cryptographic Algorithms, Cryptographic Implementation, Differential Power Analysis, Protocol Implementation, Security Protocols, Side-channel Attacks, Software And Hardwares, Side Channel Attack, Computing power, Electromagnetic waves, Microelectronics, Network security, Comparative approach, Countermeasure against side channel attack, Cryptographic algorithms, Cryptographic implementation, Differential power Analysis, Protocol implementation, Security protocols, Side-channel attacks, Software and hardwares, Side channel attack
Fields of Science
Citation
WoS Q
Scopus Q
Source
13th European Conference on Cyber Warfare and Security ECCWS 2014
