Skip to main content

Electromagnetic Analysis Enhancement with Signal Processing Techniques (Poster)

  • Conference paper
  • 889 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6812))

Abstract

This paper presents ongoing work toward Electromagnetic Analysis (EMA) with signal processing techniques. Electromagnetic emission leaks confidential data of cryptographic devices. EMA exploits such information and reveals secret keys. It has been actively studied. We present three signal processing techniques: bandpass filtering, signal companding and independent component analysis (ICA), and apply them to EMA. The effectiveness is demonstrated through the analyses of encryption algorithms on synthesized application-specific integrated circuit (ASIC). Experiments show that the performance of EMA is greatly enhanced. The number of signals needed to reveal keys has been dramatically reduced.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-card security under the Threat of Power Analysis Attacks. IEEE Transactions on Computer 51(5), 541–552 (2002)

    Article  MathSciNet  Google Scholar 

  2. Le, T.H., Servière, C., Cledière, J., Lacoume, J.-L.: Noise reduction in the side channel attack using fourth order cumulants. IEEE Trans. Inf. Forensic Security 2(4), 710–720 (2007)

    Article  Google Scholar 

  3. Homma, N., Nagashima, S., Imai, Y., et al.: A high-resolution phase-based waveform matching and its application to side-channel attacks. IEICE Transactions on Fundamentals E91-A(1) (2008)

    Google Scholar 

  4. Research Center for Information Security (RCIS) of AIST: Side-channel Attack Standard Evaluation Board (SASEBO), http://www.rcis.aist.go.jp/special/SASEBO/index-en.html

  5. Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Hyvärinen, A.: Fast and robust fixed-point algorithms for independent component analysis. IEEE Transactions on Neural Networks 10(3), 626–634 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, H., Tsunoo, Y., Goto, S. (2011). Electromagnetic Analysis Enhancement with Signal Processing Techniques (Poster). In: Parampalli, U., Hawkes, P. (eds) Information Security and Privacy. ACISP 2011. Lecture Notes in Computer Science, vol 6812. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22497-3_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22497-3_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22496-6

  • Online ISBN: 978-3-642-22497-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics