Simple Electromagnetic Analysis in Cryptography

Zdenek Martinasek, Vaclav Zeman, Krisztina Trasy

Abstract


The article describes the main principle and methods of simple electromagnetic analysis and thus provides an overview of simple electromagnetic analysis.
The introductions chapters describe specific SPA attack used visual inspection of EM traces, template based attack and collision attack.
After reading the article, the reader is sufficiently informed of any context of SEMA.
Another aim of the article is the practical realization of SEMA which is focused on AES implementation.
The visual inspection of EM trace of AES is performed step by step and the result is the determination of secret key Hamming weight.
On the resulting EM trace, the Hamming weight of the secret key 1 to 8 was clearly visible.
This method allows reduction from the number of possible keys for following brute force attack.

Full Text:

PDF

References


P. C. Kocher, J. Jaffe, and B. Jun, “Differential power analysis,” in CRYPTO ’99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology. London, UK: Springer-Verlag, 1999, pp. 388–397.

W. V. Eck and N. Laborato, “Electromagnetic radiation from video display units: An eavesdropping risk?” Computers & Security, vol. 4, pp. 269–286, 1985.

M. G. Kuhn and R. J. Anderson, “Soft tempest: Hidden data trans-mission using electromagnetic emanations,” in Proc. 2nd Workshop on Information Hiding . Springer-Verlag, 1998, pp. 124–142.

K. Gandolfi, D. Naccache, C. Paar, K. G, C. Mourtel, and F. Olivier, “Electromagnetic analysis: Concrete results,” 2001.

J.-J. Quisquater and D. Samyde, “Electromagnetic analysis (ema): Measures and counter-measures for smart cards,” in Smart Card Programming and Security, ser. Lecture Notes in Computer Science, I. Attali and T. Jensen, Eds. Springer Berlin / Heidelberg, 2001, vol. 2140, pp. 200–210, 10.1007/3-540-45418-7 17. [Online]. Available:

http://dx.doi.org/10.1007/3-540-45418-7 17

D. Agrawal, B. Archambeault, J. Rao, and P. Rohatgi, “The EM Side Channel(s),” 2003, pp. 29–45. [Online]. Available: http: //dx.doi.org/10.1007/3-540-36400-5 4

C¸ etin Kaya Koc¸, P. Rothatgi, W. Schindler, and C. D. Walter, Eds., Cryptographic Engineering, 2009.

K. Gandolfi, C. Mourtel, and F. Olivier, “Electromagnetic analysis: Concrete results,” in CHES ’01: Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems . Lon-don, UK: Springer-Verlag, 2001, pp. 251–261.

B. Struif, “Use of biometrics for user verification in electronic signature smartcards,” in Smart Card Programming and Security, I. Attali and T. Jensen, Eds., no. 2140, Berlin, 2001. [Online]. Available: 2140/21400220.htm

M. Alioto, L. Giancane, G. Scotti, and A. Trifiletti, “Leakage power analysis attacks: A novel class of attacks to nanometer cryptographic circuits,” Circuits and Systems I: Regular Papers, IEEE Transactions on, vol. 57, no. 2, pp. 355 –367, feb. 2010.

E. Peeters, F.-X. Standaert, and J.-J. Quisquater, “Power and electromagnetic analysis: Improved model, consequences and comparisons,” Integration, the VLSI Journal , vol. 40, no. 1, pp. 52 – 60, 2007, embedded Cryptographic Hardware. [Online]. Available: http://www.sciencedirect.com/science/ article/B6V1M-4J3NWY2-12/0197aa6143d75a8303ace31403077841

T. Ostermann, W. Gut, C. Bacher, and B. Deutschmann, “Measures to reduce the electromagnetic emission of a soc,” in VLSI-SOC, 2003, pp. 31–.

M. Joye and F. Olivier, “Side-channel analysis,” in Encyclopedia of Cryptography and Security (2nd Ed.) , 2011, pp. 1198–1204.

S. M. Kay, Fundamentals of Statistical Signal Processing, Volume I: Estimation Theory (v. 1), 1st ed. Prentice Hall, Apr. 1993. [Online]. Available: http://www.worldcat.org/isbn/0133457117

E. Permadim. (2010, Dec.) Pic microcontoller math library methods. [Online]. Available: http://www.piclist.com/techref/microchip/ math/index.htm

Z. Martinasek, T. Macha, and P. Stancikk, “Power side channel infor-mation measurement,” in Research in telecommunication technologies RTT2010 , September 2010.

Z. Martinasek, T. Petrik, and P. Stancik, “Conditions affecting the measurement of power analysis,” in Research in telecommunication technologies RTT2011 , September 2011.

Z. Martinasek and P. Machu, “New side channel in cryptography,” in Proceedings of the 17th Conference Student EEICT 2011, April 2011.

Z. Martinasek, T. Macha, and V. Zeman, “Classifier of power side channel,” in Proceedings of NIMT2010, September 2010.

Z. Martinasek, T. Macha, O. Raso, J. Martinasek, and P. Silhavy, “Optimization of differential power analysis,” PRZEGLAD ELEKTROTECHNICZNY, vol. 87, no. 12, pp. 140 – 144, 2011. [Online]. Available: http://pe.org.pl/articles/2011/12a/28.pdf




DOI: http://dx.doi.org/10.11601/ijates.v1i1.6

Refbacks

  • There are currently no refbacks.