2007
DOI: 10.1145/1278480.1278485
|View full text |Cite
|
Sign up to set email alerts
|

Side-channel attack pitfalls

Abstract: While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel attacks. Without expensive equipment or intrusive monitoring, these attacks bypass the mathematical complexity and find the cryptographic key by observing the power consumption or the execution time variations of the device in normal operation mode. The power traces of 8000 encryptions are for instance sufficient to extract the secret k… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2008
2008
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(19 citation statements)
references
References 35 publications
0
19
0
Order By: Relevance
“…As such they are "in fact a covert channel without conspiracy or consent." [32] Leveraging cache-based side channels to extract cryptographic keys has been studied extensively [25,29]. To mitigate the threat, researchers propose to inhibit the sources of timing channels.…”
Section: Related Workmentioning
confidence: 99%
“…As such they are "in fact a covert channel without conspiracy or consent." [32] Leveraging cache-based side channels to extract cryptographic keys has been studied extensively [25,29]. To mitigate the threat, researchers propose to inhibit the sources of timing channels.…”
Section: Related Workmentioning
confidence: 99%
“…However, as per [34], factoring 1024-bit RSA is still considered infeasible. It is almost impossible for the adversary to steal the private keys of honest peers through Side channel attacks [37] since peers in large P2P systems are generally widely dispersed across different geographical locations.…”
Section: Attack Strategies Of An Adversarymentioning
confidence: 99%
“…Power analysis attacks are performed by monitoring the currents flown through the power supply pads of cryptographic chips and usually some measurement noises are easily introduced into such power profile [6]. The measurement noise increases the difficulty of successfully mounting an SCA attack while usually a number of measurements are required to disclose the secret key.…”
Section: Introductionmentioning
confidence: 99%