2019
DOI: 10.1109/access.2019.2897938
|View full text |Cite
|
Sign up to set email alerts
|

A Modular and Optimized Toolbox for Side-Channel Analysis

Abstract: The aim of this paper is to describe the characteristics of a toolbox developed to carry out a side-channel analysis of cryptosystems implemented in physical devices. The toolbox, called RamDPA and developed in C++, is flexible and modular and has been initially designed to carry out differential power analysis attacks. Different modules are used to enter text, keys, and hypothetical values related to the cryptographic algorithm under analysis, to control the digital oscilloscope in charge of the acquisition o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 35 publications
0
1
0
Order By: Relevance
“…Timing attacks [1] were first proposed in the field of cryptographic devices in 1996. Since then, non-intrusive SCAs technology has set off a wave of research in the field of information security [4]- [8]. Power analysis attacks [2] use the energy consumption characteristics of cryptographic devices rather than the mathematical characteristics of cryptographic algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…Timing attacks [1] were first proposed in the field of cryptographic devices in 1996. Since then, non-intrusive SCAs technology has set off a wave of research in the field of information security [4]- [8]. Power analysis attacks [2] use the energy consumption characteristics of cryptographic devices rather than the mathematical characteristics of cryptographic algorithms.…”
Section: Introductionmentioning
confidence: 99%