TY - JOUR
T1 - 侧信道分析实用案例概述
AU - Wang, An
AU - Ge, Jing
AU - Shang, Ning
AU - Zhang, Fan
AU - Zhang, Guo Shuang
N1 - Publisher Copyright:
© Journal of Cryptologic Research.All right reserved.
PY - 2018/8/22
Y1 - 2018/8/22
N2 - Side-channel attacks can extract intermediate values of cryptographic operation by some physical channels, and then divide and conquer a long secret key, which is a popular research topic in cryptography. Side-channel attacks can often break cryptosystems easier than traditional cryptanalysis. Nowadays, the main evaluation institutions for cryptographic products in the world regard the side-channel protection capability as the main security measure of devices or chips. Even if a product has obtained authoritative security certification, it may still be broken by side-channel attacks. In this paper, some kinds of side-channel attack technologies and cases on practical cryptographic modules and security products are studied. The channel includes power, electromagnetic emission, fault information, remote electromagnetic and sound, cache, and so on. Some development trends of these attacks are discussed. Especially in the past three years, the side-channel attackers pay more attention to the Internet of Things, industry control system, mobile phone, intelligent terminal, and some other popular devices. Some common cryptographic devices are broken by these technologies, which bring great security threat to the personal property and collective interests.
AB - Side-channel attacks can extract intermediate values of cryptographic operation by some physical channels, and then divide and conquer a long secret key, which is a popular research topic in cryptography. Side-channel attacks can often break cryptosystems easier than traditional cryptanalysis. Nowadays, the main evaluation institutions for cryptographic products in the world regard the side-channel protection capability as the main security measure of devices or chips. Even if a product has obtained authoritative security certification, it may still be broken by side-channel attacks. In this paper, some kinds of side-channel attack technologies and cases on practical cryptographic modules and security products are studied. The channel includes power, electromagnetic emission, fault information, remote electromagnetic and sound, cache, and so on. Some development trends of these attacks are discussed. Especially in the past three years, the side-channel attackers pay more attention to the Internet of Things, industry control system, mobile phone, intelligent terminal, and some other popular devices. Some common cryptographic devices are broken by these technologies, which bring great security threat to the personal property and collective interests.
KW - Cache attack
KW - Electromagnetic attack
KW - Fault attack
KW - Power attack
KW - Side-channel attack
UR - http://www.scopus.com/inward/record.url?scp=85095838452&partnerID=8YFLogxK
U2 - 10.13868/j.cnki.jcr.000249
DO - 10.13868/j.cnki.jcr.000249
M3 - 文章
AN - SCOPUS:85095838452
SN - 2095-7025
VL - 5
SP - 383
EP - 398
JO - Journal of Cryptologic Research
JF - Journal of Cryptologic Research
IS - 4
ER -