2006 World Automation Congress 2006
DOI: 10.1109/wac.2006.375739
|View full text |Cite
|
Sign up to set email alerts
|

Differential Electromagnetic Attack on an FPGA Implementation of Elliptic Curve Cryptosystems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
20
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(20 citation statements)
references
References 12 publications
0
20
0
Order By: Relevance
“…From the view point of the cryptographic hardware implementation, one of the main issues is related to the security of processed information by side-channel analysis (SCA) attacks. The SCA attacks, such as differential power analysis (DPA) [3] and differential electromagnetic analysis (DEMA) [4] have become a crucial challenge for cryptographers and hardware engineers to maintain the secrecy of private information in cryptographic hardware implementation, such as in smart card. The main factors of aforementioned attacks are related to CMOS logic power consumption, required operational time and the electromagnetic signals emanating from a device while it is executing a cryptographic process.…”
Section: Introductionmentioning
confidence: 99%
“…From the view point of the cryptographic hardware implementation, one of the main issues is related to the security of processed information by side-channel analysis (SCA) attacks. The SCA attacks, such as differential power analysis (DPA) [3] and differential electromagnetic analysis (DEMA) [4] have become a crucial challenge for cryptographers and hardware engineers to maintain the secrecy of private information in cryptographic hardware implementation, such as in smart card. The main factors of aforementioned attacks are related to CMOS logic power consumption, required operational time and the electromagnetic signals emanating from a device while it is executing a cryptographic process.…”
Section: Introductionmentioning
confidence: 99%
“…A DPA attack seeks to reveal the secret key of a smart card by statistically analyzing the power fluctuations that occur while the device encrypts and decrypts large blocks of data [1]. Apart from the DPA attacks, the differential electromagnetic radiation attack (DEMA) has been extensively studied [2]. DEMA attacks can reveal secret information because the current flow during the switching of the CMOS gates causes a variation in the surrounding electromagnetic field, which can be monitored by positioning an inductive probe around the microcontroller chip.…”
Section: Introductionmentioning
confidence: 99%
“…The idea behind HD model is to count the number of P 0→1 and P 1→0 , P 0→0 and P 1→1 transitions that occur in the digital circuit during a certain time interval with the assumption of (P 0→1 ≈ P 1→0 ) = (P 0→0 ≈ P 1→1 ). From the view point of DPA and DEMA attack techniques, the scCMOS and DR-CMOS are vulnerable, because they perform different peak current transition and different large magnitude which cause a sudden variation of the electromagnetic field surrounding the chip as reported in [2]. As a result, the DPA and DEMA attacks are a bit difficult to avoid.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the side-channel analysis (SCA) attacks were introduced in [4] have become crucial challenges for cryptographers and hardware engineers to maintain the secrecy of private information in the cryptographic hardware, such as in smart card. Among other types of side-channel attacks, differential power analysis (DPA) attacks [5] and differential electromagnetic analysis (DEMA) [6] have been taken into consideration because of their technical measurement and statistical calculation efficiency to find the secret key and the applicability on various types of implementation.…”
Section: Introductionmentioning
confidence: 99%