Download PDF (external access)

IEEE Potentials

Publication date: 2006-01-01
Volume: 25 Pages: 13 - 17
Publisher: Institute of Electrical and Electronics Engineers

Author:

De Mulder, Elke
Buysschaert, P ; Ors, SB ; Delmotte, Peter ; Preneel, Bart ; Vandenbosch, Guy ; Verbauwhede, Ingrid

Keywords:

cosic, Networking & Telecommunications, 4010 Engineering practice and education

Abstract:

The importance to measure the vulnerability of cryptographic algorithms that are essential in protecting the confidentiality and authentication of data is discussed. A simple electromagnetic analysis (SEMA) attack on an unprotected implementation and differential electromagnetic analysis (DEMA) attack on an improved implementation is also discussed. The three main physical properties of cryptographic algorithms can be exploited in side-channel attacks including power consumption, timing, and electromagnetic radiation. In SEMA, an attacker uses the information from one electromagnetic radiation measure directly to determine the secret key, while in DEMA, measurements are used to filter out noise and the key is derived using a statistical analysis. It is necessary to optimize these attacks using sophisticated antennas and signal processing techniques. The system designers and cryptographers should develop, implement, and evaluate the countermeasures against side channel attacks.