Highly secure and low overhead countermeasures against side-channel attacks
Side-Channel Attack (SCA) is an emerging technique to reveal the secret key of crypto-devices by analyzing the processed-data and their Physical Leakage Information (PLI). The crypto-devices refer to electronic devices such as smartphone, smartcards, wearable devices, and Internet of Things (IoT) im...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Theses and Dissertations |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/83538 http://hdl.handle.net/10220/48023 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | Side-Channel Attack (SCA) is an emerging technique to reveal the secret key of crypto-devices by analyzing the processed-data and their Physical Leakage Information (PLI). The crypto-devices refer to electronic devices such as smartphone, smartcards, wearable devices, and Internet of Things (IoT) implemented with cryptographic algorithms. The processed-data can either be the plaintext or the ciphertext. The PLI includes the power dissipation, electromagnetic interference, acoustic, temperature, and timing information of the crypto-device. The Correlation based Attack (CbA) is the most commonly used SCA. In the CbA, the correlation between the processed-data and the PLI is analyzed to reveal the secret key. In contrast, to secure the secret key against the CbA, countermeasure techniques can be applied to reduce the correlation between the processed-data and the PLI. |
---|