2012
DOI: 10.1587/transele.e95.c.1089
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…It was found that, the radiative interference patterns of TV power supplies yielded discernable information about the media being played. The work of Hayashi [68][69][70] has demonstrated the viability of obtaining secret keys from the radiation patterns of power and communication cables attached to FPGA (field programmable gate array) boards. His work has shown that, cryptographic key information may leak from near field [68] and far field [69] radiation patterns.…”
Section: Many Proofs Of the Concept Have Been Demonstratedmentioning
confidence: 99%
“…It was found that, the radiative interference patterns of TV power supplies yielded discernable information about the media being played. The work of Hayashi [68][69][70] has demonstrated the viability of obtaining secret keys from the radiation patterns of power and communication cables attached to FPGA (field programmable gate array) boards. His work has shown that, cryptographic key information may leak from near field [68] and far field [69] radiation patterns.…”
Section: Many Proofs Of the Concept Have Been Demonstratedmentioning
confidence: 99%
“…However, different types of risks have been reported that could bypass such protection by utilizing radiated emission, which is a physical phenomenon prevalent in the hardware of electronic devices [2]. The technique based on this physical phenomenon is called a side-channel attack, and its purpose is to classify unspecified information such as cryptographic keys [3], display information [4], and other types of eavesdropping. This study intends to focus on the possibility of the information reconstruction from the electromagnetic leakage (EM leakage) from the standardized display interface (SDI) cables, and the related historical background is briefly described.…”
Section: Introductionmentioning
confidence: 99%
“…However, different types of risks also have been reported that could bypass such protection by utilizing radiated emission, which is a physical phenomenon inherent in the hardware of electronic devices [2]. The technique based on this physical phenomenon is called a side-channel attack, and its purpose is to recover specific information such as cryptographic keys [3], display information [4], or other types of sensitive information. This study intends to focus on the recent technological progress on the possibility of the information re-construction from the electromagnetic leakage (EM leakage) from the standardized display interface (SDI) cables, and the related historical background is briefly described.…”
Section: Introductionmentioning
confidence: 99%