Side-Channel Issues for Designing Secure Hardware Implementations

  • Authors:
  • Lejla Batina;Nele Mentens;Ingrid Verbauwhede

  • Affiliations:
  • Katholieke Universiteit Leuven;Katholieke Universiteit Leuven;Katholieke Universiteit Leuven

  • Venue:
  • IOLTS '05 Proceedings of the 11th IEEE International On-Line Testing Symposium
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Selecting a strong cryptographic algorithm makes no sense if the information leaks out of the device through side-channels. Sensitive information, such as secret keys, can be obtained by observing the power consumption, the electromagnetic radiation, etc. This class of attacks are called side-channel attacks. Another type of attacks, namely fault attacks, reveal secret information by inserting faults into the device. Because both side-channel attacks and fault attacks are based on weaknesses in the implementation, they both belong to the category of implementation attacks. This work gives an overview of the state-of-the-art in implementation attacks, reviews the origin of this problem at the CMOS circuit level and discusses countermeasures.