2010 IEEE International Symposium on Electromagnetic Compatibility 2010
DOI: 10.1109/isemc.2010.5711256
|View full text |Cite
|
Sign up to set email alerts
|

Information leakage from cryptographic hardware via common-mode current

Abstract: Recently, it has been known that electromagnetic radiation from electrical device leaks internal information. That is, electromagnetic radiation contains information. Especially, it causes serious problem for cryptographic modules if electromagnetic radiation contains secret information. Therefore many studies have been made on power/electromagnetic analysis attacks, which extract secret keys from cryptographic modules by analyzing waveforms of currents, voltage or electromagnetic field. The attacks assume tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
3

Relationship

4
3

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…The fluctuation in voltage between VDD and GND of FPGA1 during the encryption process was observed from the J8 observation point on SASEBO-G. As mentioned earlier in this section, the EM leakage waveforms related to the processing executed in the IC can also be observed as EM radiation from the IC, the leakage of common-mode current through the connection line, and so on [11]. To verify the validity of the proposed method, we measured fluctuations in the power supply voltage of the IC, which is a relatively low-noise and reproducible source of a leakage signal.…”
Section: B Verification and Discussion Of The Mechanismmentioning
confidence: 68%
“…The fluctuation in voltage between VDD and GND of FPGA1 during the encryption process was observed from the J8 observation point on SASEBO-G. As mentioned earlier in this section, the EM leakage waveforms related to the processing executed in the IC can also be observed as EM radiation from the IC, the leakage of common-mode current through the connection line, and so on [11]. To verify the validity of the proposed method, we measured fluctuations in the power supply voltage of the IC, which is a relatively low-noise and reproducible source of a leakage signal.…”
Section: B Verification and Discussion Of The Mechanismmentioning
confidence: 68%
“…Therefore, we measured the CM current by considering various transfer functions for electronic devices with different physical structures. For simplicity, we employed models of cryptographic devices rather than actual cryptographic devices [9]- [13]. Note that we only use the model in order to emulate changing transfer function depending on propagation path from a device to an area of interest.…”
Section: Introductionmentioning
confidence: 99%
“…It was found that, the radiative interference patterns of TV power supplies yielded discernable information about the media being played. The work of Hayashi [68][69][70] has demonstrated the viability of obtaining secret keys from the radiation patterns of power and communication cables attached to FPGA (field programmable gate array) boards. His work has shown that, cryptographic key information may leak from near field [68] and far field [69] radiation patterns.…”
Section: Many Proofs Of the Concept Have Been Demonstratedmentioning
confidence: 99%