Experimental results of electromagnetic analysis on smartcard
DOI:
https://doi.org/10.54654/isj.v9i01.974Keywords:
Electromagnetic analysis, side channel attack, EM leakageTóm tắt
Abstract— Electromagnetic analysis attack is a form of side channel attack that can be used to reveal secret information of a cryptographic device by examination of electromagnetic radiations. The effectiveness of EMA has a large dependences on the quality of the electromagnetic radiation measured by the measuring system and how the EM traces are simulated during the key recovery procedures. In this paper, we propose the practical procedure for electromagnetic analysis attack methods and the experimental results of EMA on smartcard that implemented AES algorithm, including assessing the influence of measuring system, radiation leakage model on effectiveness of attacks.
Downloads
References
. P. Kocher, "Cryptanalysis of Diffie-Hellman, RSA, DSS, and other cryptosystems using timing attacks," in International Advances in Cryptology Conference , 1995.
. P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in 19th International Advances in Cryptology Conference, 1999.
. J-J. Quisquater and D. Samyde, "Electromagnetic analysis (ema): Measures and counter-measures for smart cards," E-smart, pp. 200-210, 2001.
. D. Agrawal, B. Archambeault, J. Rao, and P. Rohatgi, "The EM side-channel(s)," in Cryptographic Hardware and Embedded Systems - CHES2002, 2002.
. K. Gandolfi, C. Mourtel, and F. Olivier, "Electromagnetic analysis: Concrete results," in Cryptographic Hardware and Embedded Systems, 2001.
. D. P. Montminy, R. O. Baldwin, M. A. Temple, and M. E. Oxley, "Differential electromagnetic attacks on a 32-bit microprocessor using software defined radio," Information Forensics and Security, vol. 8, no. 12, pp. 2101-2114, 2013.
. J. Longo, E. D. Mulder, D. Page, and M. Tunstall, "Soc it to EM: electromagnetic side-channel attacks on a complex system-on-chip," Cryptology ePrint Archive, 2015.
. C. H. Gebotys, S. Ho, and C. C. Tiu, "EM analysis of rijndael and ECC on a wireless java-based PDA," in Cryptographic Hardware and Embedded Systems, 2005.
. Sung-Mo Kang,Yusuf Leblebic, CMOS Digital Integrated Circuits:Analysis and Design, McGraw-Hill Science, 2002.
. Stephane Bronckers, Geert Van der Plas, and Yves Rolain, Substrate noise coupling in analog/RF circuits, Artech House, 2010.
. Brier, E., Clavier, C., Olivier, F, "Correlation power analysis with a leakage model," in Cryptographic Hardware and Embedded Systems, 2014.
. Peeters, E., Standaert, F.-X., Quisquater, J.-J, "Power and electromagnetic analysis: improved model, consequences and comparisons," Integration VLSI, vol. 40, pp. 52-60, 2007.
. S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, Berlin: Springer-Verlag, 2007.
. E. D. Mulder, Electromagnetic techniques and probes for side-channel analysis on cryptographic devices, PhD Thesis, 2010.
. Kocher, P., Jaffe, J., Jun, B. et al. Introduction to differential power analysis. J Cryptogr Eng 1, 5–27 (2011).
. Owen Lo, William J. Buchanan & Douglas Carson, Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA), Journal of Cyber Security Technology, 88-107, 2017.
. Quy, T. N., Tung, N. T., Trung, D. Q., & Viet, D. H. (2022). Convolutional neural network based sidechannel attacks. Journal of Science and Technology on Information Security, 1(15), 26-37. https://doi.org/10.54654/isj.v1i15.834.
. Hảo, N. N. V., & Chính, B. Đức. (2020). Phương pháp phát nhiễu đồng bộ chống thu bức xạ kênh kề phát ra từ màn hình máy tính dựa trên công nghệ FPGA. Journal of Science and Technology on Information Security, 7(1), 44-50.
. Bui, C. D., Ngo, M. T., Nguyen, H. N. V., & Pham, T. M. (2020). Information leakage through electromagnetic radiation of PS/2 Keyboard. Journal of Science and Technology on Information Security, 10(2), 51-60. https://doi.org/10.54654/isj.v10i2.67.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).