Side-channel attacks, countermeasures, and evaluations

From NUEESS

Revision as of 15:03, 30 May 2012 by LaoJian (Talk | contribs)
Jump to: navigation, search

General

Side channel attack on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis attack is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly. The two most widely developed techniques for power analysis attacks are DPA (differential power analysis) and CPA (correlation power analysis).

Models

Evaluations





Whos here now:   Members 0   Guests 0   Bots & Crawlers 1
 
Personal tools