Proceedings of the 59th ACM/IEEE Design Automation Conference 2022
DOI: 10.1145/3489517.3530437
|View full text |Cite
|
Sign up to set email alerts
|

Apple vs. EMA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Symmetric encryption algorithms, i.e., AES and DES, are particularly vulnerable to EM side-channel attacks since they require a secret key to both encrypt and decrypt data [92,94,167]. EM-SCA can be used by attackers to extract information about the secret key, and examples of devices that implement DES and AES, and thus are vulnerable, e.g., smartphones [94], laptops/computers [30], and other portable devices that use encryption to protect sensitive data. The AES algorithm is more effective compared to DES and can process larger block sizes of plaintext with low power dissipation and fast processing time.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Symmetric encryption algorithms, i.e., AES and DES, are particularly vulnerable to EM side-channel attacks since they require a secret key to both encrypt and decrypt data [92,94,167]. EM-SCA can be used by attackers to extract information about the secret key, and examples of devices that implement DES and AES, and thus are vulnerable, e.g., smartphones [94], laptops/computers [30], and other portable devices that use encryption to protect sensitive data. The AES algorithm is more effective compared to DES and can process larger block sizes of plaintext with low power dissipation and fast processing time.…”
Section: Discussionmentioning
confidence: 99%
“…Several parts of a smartphone's entire surface can include sensitive information about the computation: Power Management Integrated Circuit (PMIC), external decoupling capacitors, sense resistors, and system-on-chip die. A physical side-channel attack on an ARMv8 Cryptographic Extension (ARM CE)-based AES implementation is presented in a publication by Haas and Aysu [94]. The usual source of cryptographic capability for iPhones, Apple's CoreCrypto library, which uses the ARM CE code, was the target of the attack.…”
Section: A Em-sca On Aes Implementationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Using power-based SCAs, hackers try to figure out the hidden key through the relationship among the cryptographic device's battery usage and the computations that utilize the secret key. 7,8 By sifting through an extensive amount of energy traces to find this little link from noise, introduced a traditional method like DPA to attack the secret key. Yet, as PQKE protocols produce a unique secret key for every execution within the protocol, applying DPA with them is impractical.…”
Section: Introductionmentioning
confidence: 99%
“…Lattice‐based cryptographic works are efficiently used in both software and hardware environments. Using power‐based SCAs, hackers try to figure out the hidden key through the relationship among the cryptographic device's battery usage and the computations that utilize the secret key 7,8 . By sifting through an extensive amount of energy traces to find this little link from noise, introduced a traditional method like DPA to attack the secret key.…”
Section: Introductionmentioning
confidence: 99%