Abstract
Electromagnetic Aattacks hve been recently identified as an efficient technique to retrieve the secret key of cryptographic algorithms. Although similar mathematically speaking, Power or Electromagnetic Attacks have different advantages in practice. Among the advantages of EM attacks, the feasibility of attacking limited and bounded area of integrated systems is the key one. However, efficient techniques are required to localize hot spots, characterized by partially data dependent electromagnetic emissions, at which DEMA may be applied with success. This paper aims at introducing a pragmatic technique to localize quickly and efficiently these points of interest.
Chapter PDF
Similar content being viewed by others
References
Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic Analysis: Concrete Results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 251–261. Springer, Heidelberg (2001)
Peeters, E., Standaert, F.X., Quisquater, J.J.: Power and electromagnetic analysis: Improved model consequences and comparisons. Integration, the VLSI Journal, Special Issue: Embedded Cryptographic Hardware 40(1), 52–60 (2007)
Shamir, A.: Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 121–132. Springer, Heidelberg (2000)
Clavier, C., Coron, J.S., Dabbous, N.: Differential Power Analysis in the Presence of Hardware Countermeasures. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 252–263. Springer, Heidelberg (2000)
Moyart, H.D., Bevan, R.: A Method for Resynchronizing a random clock on smartcards. Eurosmart (2001), http://www.nmda.or.jp/nmda/ic-card/proceedings/30-1440-DMoyart.pdf
Pelletier, H., Charvet, X.: Improving the DPA attack using wavelet transform. In: NISTs Physical Security Testing Workshop (2005), http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-3/physec/papers/physecpaper14.pdf
Homma, N., Nagashima, S., Imai, Y., Aoki, T., Satoh, A.: High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 187–200. Springer, Heidelberg (2006)
Kafi, M., Guilley, S., Marcello, S., Naccache, D.: Deconvolving Protected Signals. In: Proc. of the International Conference on Availability, Reliability and Security (ARES), pp. 687–694 (2009)
Coron, J.S., Naccache, D., Kocher, P.: Statistics and secret leakage. ACM Transactions on Embedded Computer Systems 3, 492–508 (2004)
Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004)
Data Encryption Standard, FIPS PUB 46-3
Advanced Encryption Standard, FIPS 197
Bevan, R., Knudsen, E.: Ways to Enhance Differential Power Analysis. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 327–342. Springer, Heidelberg (2003)
Messerges, T., Dabbish, E., Sloan, R.: Investigations of power analysis attacks on smartcards. In: Proc. of the USENIX Workshop on Smartcard Technology on WOST, p. 17 (1999)
Yeap, G.: Practical Low Power Digital VLSI Design. Springer, Heidelberg (1997)
Dhia, S., Ramdani, M., Sicard, E.: Electromagnetic Compatibility of Integrated Circuits: Techniques for low emission and susceptibility. Springer, Heidelberg (2005)
Ordas, T., Lisart, M., Sicard, E., Maurine, P., Torres, L.: Near-Field Mapping System to Scan in Time Domain the Magnetic Emissions of Integrated Circuits. In: Svensson, L., Monteiro, J. (eds.) PATMOS 2008. LNCS, vol. 5349, pp. 229–236. Springer, Heidelberg (2009)
DPA contest (2008/2009), http://www.dpacontest.org
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 IFIP International Federation for Information Processing
About this paper
Cite this paper
Dehbaoui, A., Lomne, V., Maurine, P., Torres, L., Robert, M. (2011). Enhancing Electromagnetic Attacks Using Spectral Coherence Based Cartography. In: Becker, J., Johann, M., Reis, R. (eds) VLSI-SoC: Technologies for Systems Integration. VLSI-SoC 2009. IFIP Advances in Information and Communication Technology, vol 360. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23120-9_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-23120-9_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23119-3
Online ISBN: 978-3-642-23120-9
eBook Packages: Computer ScienceComputer Science (R0)