2022
DOI: 10.3390/s22218096
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Survey on the Non-Invasive Passive Side-Channel Analysis

Abstract: Side-channel analysis has become a widely recognized threat to the security of cryptographic implementations. Different side-channel attacks, as well as countermeasures, have been proposed in the literature. Such attacks pose a severe threat to both hardware and software cryptographic implementations, especially in the IoT environment where the attacker may easily gain physical access to a device, leaving it vulnerable to tampering. In this paper, we provide a comprehensive survey regarding the non-invasive pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 130 publications
0
4
0
Order By: Relevance
“…Recent studies emphasize the importance of mitigating these attacks through various countermeasures. In [40], Socha et al provided a comprehensive overview of the impact of side-channel attacks on both hardware and software cryptographic implementations. Additionally, Vanhoef et al [41] presented a timing attack against an encoding method to elliptic curve points, exploiting timing leaks generated by arithmetic operations behind ECC.…”
Section: Side-channel Attacksmentioning
confidence: 99%
“…Recent studies emphasize the importance of mitigating these attacks through various countermeasures. In [40], Socha et al provided a comprehensive overview of the impact of side-channel attacks on both hardware and software cryptographic implementations. Additionally, Vanhoef et al [41] presented a timing attack against an encoding method to elliptic curve points, exploiting timing leaks generated by arithmetic operations behind ECC.…”
Section: Side-channel Attacksmentioning
confidence: 99%
“…Here, r out and r [3] are the output mask of the recomputedsbox and linear mask of the AES state, respectively. We show the SNR calculated from the raw traces and the CWT coefficients for the previous four values in Figure 1 (jitter-free) and Figure 2 (jittery).…”
Section: Advantages Of Wavelet Transform In Side-channel Analysismentioning
confidence: 99%
“…Therefore, hardware (implementation) level security of a cryptographic algorithm cannot be guaranteed, even if the algorithm or scheme level security has been mathematically proven unless side-channel analysis-specific countermeasures are investigated. For this reason, side-channel analysis is still actively researched in cryptanalysis/hardware security academia and the semiconductor industry [3].…”
Section: Introductionmentioning
confidence: 99%
“…To obtain the secret key, this paper proposes a variety of power analysis attacks that make use of either profiling or nonprofiling techniques that are based on Convolutional Neural Network (CNN) [11] models. Since Z originally presented the concept of side-channel attack, there have been several fascinating advancements in the actual research that has been conducted in this sector [12].…”
Section: Introductionmentioning
confidence: 99%