侧信道分析实用案例概述

An Wang*, Jing Ge, Ning Shang, Fan Zhang, Guo Shuang Zhang

*此作品的通讯作者

科研成果: 期刊稿件文章同行评审

10 引用 (Scopus)

摘要

Side-channel attacks can extract intermediate values of cryptographic operation by some physical channels, and then divide and conquer a long secret key, which is a popular research topic in cryptography. Side-channel attacks can often break cryptosystems easier than traditional cryptanalysis. Nowadays, the main evaluation institutions for cryptographic products in the world regard the side-channel protection capability as the main security measure of devices or chips. Even if a product has obtained authoritative security certification, it may still be broken by side-channel attacks. In this paper, some kinds of side-channel attack technologies and cases on practical cryptographic modules and security products are studied. The channel includes power, electromagnetic emission, fault information, remote electromagnetic and sound, cache, and so on. Some development trends of these attacks are discussed. Especially in the past three years, the side-channel attackers pay more attention to the Internet of Things, industry control system, mobile phone, intelligent terminal, and some other popular devices. Some common cryptographic devices are broken by these technologies, which bring great security threat to the personal property and collective interests.

投稿的翻译标题Practical cases of side-channel analysis
源语言繁体中文
页(从-至)383-398
页数16
期刊Journal of Cryptologic Research
5
4
DOI
出版状态已出版 - 22 8月 2018

关键词

  • Cache attack
  • Electromagnetic attack
  • Fault attack
  • Power attack
  • Side-channel attack

指纹

探究 '侧信道分析实用案例概述' 的科研主题。它们共同构成独一无二的指纹。

引用此