Skip to main content

Side-Channel Attacks on Cryptographic Devices and Their Countermeasures—A Review

  • Conference paper
  • First Online:
Smart Innovations in Communication and Computational Sciences

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 851))

Abstract

Attacks on cryptographic devices and systems are rampant that leads to the weakening of information security protocols. Side- channel attacks (SCAs) being a major avenue of such attacks, utilizes the characteristic of the cryptographic devices for the sensitive information theft. Targets of attacks range from primitives, protocols, modules and devices to even major systems. Shielding the device or a system from such attacks and the consideration of the various compatible countermeasures for a specific application are a major concern. Reviews on different methods and strategies for suitable countermeasures on various side-channel attacks are presented in this paper. The feasibility for the practical implementation of few prominent countermeasures that can yield good resistance against these attacks is analysed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Willam, S.: Cryptography and Network Security: Principles and Practices. Pearson Education, India (2006)

    Google Scholar 

  2. Galbraith, S.D.: Mathematics of Public Key Cryptography. Cambridge University Press (2012)

    Google Scholar 

  3. Grah, J.S.: Hash functions in cryptography. Master thesis, Institute of Informatics, Department of Mathematics, University of Bergen, June 2008

    Google Scholar 

  4. Zhou, Y., Feng, D.: Side-channel attacks: ten years after its publication and the impacts on cryptographic module security testing. In: Information Security Seminar (2005)

    Google Scholar 

  5. Khan, A.K., Mahanta, H.J.: Side channel attacks and their mitigation techniques. In: First International Conference on Automation, Control, Energy and Systems (ACES) (2014)

    Google Scholar 

  6. Kang, Y.J., Bruce, N., Park, S., Lee, H.: A study on information security attack based side-channel attacks. In: 18th International Conference on Advanced Communication Technology (ICACT), Pyeongchang (2016)

    Google Scholar 

  7. Standaert, F.X.: Introduction to side-channel attacks. In: Verbauwhede, I.M.R. (ed.) Secure Integrated Circuits and Systems, pp. 27-42. Springer (2010)

    Google Scholar 

  8. Schneier, B.: Security pitfalls in cryptography. http://www.schneier.com/essay-pitfalls.html

  9. Anderson, R., Bond, M., Clulow, J., Skorobogatov, S.: Cryptographic processors—a survey. Proc. IEEE 94(2), 357–369 (2006)

    Google Scholar 

  10. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO 1999, pp. 388–397. Springer, London (1999)

    Google Scholar 

  11. Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems. In: Koblitz, N. (ed.) The Proceedings of the 16th Annual International Conference on Advances in Cryptology (CRYPTO96), vol. 1109, pp. 104–113. Springer (1996)

    Google Scholar 

  12. Spadavecchia, L.: A network-based asynchronous architecture for cryptographic devices, (Thesis Submission) (2005)

    Google Scholar 

  13. Fleming, C., Cui, N., Liu, D., Liang, H.: Attacking random keypads through click timing analysis. In: International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 118–121 (2014)

    Google Scholar 

  14. Wang, W., Yu, Y., Standaert, F.X., Liu, J., Guo, Z., Gu, D.: Ridge-based DPA: improvement of differential power analysis for nanoscale chips. IEEE Trans. Inf. Forensics Secur. 13(5), 1301–1316 (2018)

    Google Scholar 

  15. Kabin, I., Dyka, Z., Kreiser, D., Langendoerfer, P.: Evaluation of resistance of ECC designs protected by different randomisation countermeasures against horizontal DPA attacks. In: IEEE East West design and Test Symposium (EWDTS) (2017)

    Google Scholar 

  16. Yu, W., Kse, S.: A voltage regulator-assisted lightweight AES implementation against DPA attacks. IEEE Trans. Circ. Syst. I Regular Papers 63(8), 1152–1163 (2016)

    Google Scholar 

  17. Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: CHES 2001, LNCS 2162, pp. 251–261 (2001)

    Google Scholar 

  18. Quisquater, J.J., Samyde, D.: Electromagnetic analysis (EMA): measures and countermeasures for smart cards. In: The Proceedings of the International Conference on Research in Smart Cards (E-smart 2001), vol. 2140-LNCS, pp. 200–210. Springer (2001)

    Google Scholar 

  19. Gu, K., Wu, L., Li, X., Zhang, X.M.: Design and implementation of an electromagnetic analysis system for smart cards. In: 2011 Seventh International Conference on Computational Intelligence and Security, Hainan, pp. 653–656 (2011)

    Google Scholar 

  20. Yang, B., Wu, K., Karri, R.: Scan-based side-channel attack on dedicated hardware implementations of data encryption standard. In: Proceedings of International Test Conference 2004 (ITC 2004), Charlotte, pp. 339–344 (2004)

    Google Scholar 

  21. Oku, D., Yanagisawa, M., Togawa, N.: A robust scan-based side-channel attack method against HMAC-SHA-256 circuits. In: 2017 IEEE 7th International Conference on Consumer Electronics-Berlin (ICCE-Berlin), Berlin, pp. 79–84 (2017)

    Google Scholar 

  22. Rolt, J.D., Di Natale, G., Flottes, M.L., Rouzeyre, B.: Thwarting scan-based attacks on secure-ICs with on-chip comparison. IEEE Trans. Very Large-Scale Integr. (VLSI) Syst. 22(4), 947–951 (2014)

    Google Scholar 

  23. Luo, Y., Cui, A., Qu, G., Li, H.: A new countermeasure against scan-based side-channel attacks. In: 2016 IEEE International Symposium on Circuits and Systems (ISCAS), Montreal, QC, pp. 1722–1725 (2016)

    Google Scholar 

  24. Namin, S.H., Mehta, A., Namin, P.H., Rashidzadeh, R., Ahmadi, M.: A secure test solution for sensor nodes containing crypto-cores. In: 2017 IEEE International Symposium on Circuits and Systems (ISCAS), Baltimore, MD, pp. 1–4 (2017)

    Google Scholar 

  25. Kelsey, J., Schneier, B., Wagner, D., Hall, C.: Side channel cryptanalysis of product ciphers. In: Proceedings of the 5th European Symposium on Research in Computer Security, LNCS 1485, pp. 97110 (1998)

    Google Scholar 

  26. Gajrani, J., Mazumdar, P., Sharma, S., Menezes, B.: Challenges in implementing cache-based side channel attacks on modern processors. In: 2014 27th International Conference on VLSI Design and 2014 13th International Conference on Embedded Systems, Mumbai, pp. 222–227 (2014)

    Google Scholar 

  27. Wright, P.: Spy Catcher: The Candid Autobiography of a Senior Intelligence Officer. Viking Press (1987)

    Google Scholar 

  28. Faruque, A., Abdullah, M., Chhetri, S.R., Canedo, A., Wan, J.: Acoustic side-channel attacks on additive manufacturing systems. In: 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS), Vienna, pp. 1–10 (2016)

    Google Scholar 

  29. Kuhn, M.G.: Optical time-domain eavesdropping risks of CRT displays. In: Proceedings 2002 IEEE Symposium on Security and Privacy, pp. 3–18 (2002)

    Google Scholar 

  30. Loughry, J., Umphress, D.: Information leakage from optical emanations. ACM Trans. Inf. Syst. Secur. 5, 262–289 (2002)

    Google Scholar 

  31. Tajik, S., Dietz, E., Frohmann, S., Dittrich, H., Nedospasov, D., Helfmeier, C., Seifert, J.P., Boit, C., HĂĽbers, H.W.: Photonic Side Channel Analysis of Arbiter PUFs (2016)

    Google Scholar 

  32. Carmon, E., Seifert, J.P., Wool, A.: Photonic side channel attacks against RSA. In: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), McLean, VA, pp. 74–78 (2017)

    Google Scholar 

  33. Clavier, C., Feix, B., Gagnerot, G., Roussellet, M.: Passive and active combined attacks on AES combining fault attacks and side channel analysis. In: 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, Santa Barbara, CA, pp. 10–19 (2010)

    Google Scholar 

  34. Vaudenay, S.: Security flaws induced by CBC padding applications to SSL, IPSEC, WTLS. In: EUROCRYPT 2002, LNCS 2332, pp. 534–545 (2002)

    Google Scholar 

  35. Ha, Y., Jang, S.H., Kim, K.W., Yoon, J.W.: Side channel attack on digital door lock with vibration signal analysis: longer password does not guarantee higher security level. In: 2017 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI), Daegu, pp. 103–110 (2017)

    Google Scholar 

  36. TechDifferences.: Difference Between Active and Passive Attacks. (2008). https://techdifferences.com/difference-between-active-and-passive-attacks.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. M. Sravani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sravani, M.M., Ananiah Durai, S. (2019). Side-Channel Attacks on Cryptographic Devices and Their Countermeasures—A Review. In: Tiwari, S., Trivedi, M., Mishra, K., Misra, A., Kumar, K. (eds) Smart Innovations in Communication and Computational Sciences. Advances in Intelligent Systems and Computing, vol 851. Springer, Singapore. https://doi.org/10.1007/978-981-13-2414-7_21

Download citation

Publish with us

Policies and ethics