Proceedings of the 7th International Conference on Computer Engineering and Networks — PoS(CENet2017) 2017
DOI: 10.22323/1.299.0042
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Side-Channel Attack and Security Assessment for Cryptographic Equipment

Abstract: In order to understand the development of current channel energy analysis technology and protection strategy, at the same time, we will lay the foundation for establishing safety evaluation system about Encryption device in the next stage. We analyzed the side-channel attacks of the current mainstream encryption algorithms. The side-channel attack is classified by combining the specific operations of the algorithm that are easily attacked by the attacker. Aiming at the more popular DPA attacks, the paper focus… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Side channel attacks (SCA) have been introduced to attack encryption algorithms and steal the security keys by analyzing the energy or frequency fluctuations on embedded devices [13], [23]. SCA is based on encryption algorithms that can be roughly divided into two categories: common key system based and public key based [2]. Some existing methods that are used to mitigate power analysis based SCA use (a) a capacitor in parallel to the target device, (b) an inductor in series with the target device, (c) LC filter, (d) Zener diode, and (e) another target device in parallel [10].…”
Section: State Of the Art And Related Workmentioning
confidence: 99%
“…Side channel attacks (SCA) have been introduced to attack encryption algorithms and steal the security keys by analyzing the energy or frequency fluctuations on embedded devices [13], [23]. SCA is based on encryption algorithms that can be roughly divided into two categories: common key system based and public key based [2]. Some existing methods that are used to mitigate power analysis based SCA use (a) a capacitor in parallel to the target device, (b) an inductor in series with the target device, (c) LC filter, (d) Zener diode, and (e) another target device in parallel [10].…”
Section: State Of the Art And Related Workmentioning
confidence: 99%
“…Side channel attacks (SCA) have been introduced to attack encryption algorithms and steal the security keys by analyzing the energy or frequency fluctuations on embedded devices [13], [23]. SCA is based on encryption algorithms that can be roughly divided into two categories: common key system based and public key based [2].…”
Section: State Of the Art And Related Workmentioning
confidence: 99%
“…Although KDFs have been proven to be secure by using the mathematical analysis [7], KDFs could be susceptible to physical attacks during implementation. These types of attacks are known as side‐channel attacks [9, 10]. Side‐channel attacks exploit information leakage during cryptographic implementations such as execution time [11–13], electromagnetic radiation [14, 15], acoustic [16, 17], and power consumption [18, 19] to infer sensitive information.…”
Section: Introductionmentioning
confidence: 99%