Overview of the Side Channel Attacks
Journal: International Journal of Advanced Networking and Applications (Vol.4, No. 06)Publication Date: 2013-05-06
Authors : Dr.E.Kesavulu Reddy;
Page : 1799-1808
Keywords : Side-Channel Attacks; Simple Power Analysis Attacks; Differential Power Analysis Attacks;
Abstract
The security of cryptographic algorithms such as block ciphers and public-key algorithms relies on the secrecy of the key. Traditionally, when cryptanalysists examine the security of a cryptographic algorithm, they try to recover the secret key by observing the inputs and outputs of the algorithm. Assuming this type of attack models, cryptologists have made commonly-used cryptographic algorithms secure against such attacks. However, a real computing device not only generates the outputs specified in algorithms but also inevitably produces some other information such as timing and power. These types of information, called side-channel information, can be exploited in side-channel attacks to retrieve secret keys. Side channel attacks have successfully broken many algorithms.
Other Latest Articles
- OSRWQOS: Optimized Secure Routing Protocol with QoS against Byzantine Attack
- ECLB: A Novel Exhaustive Criterion Based Load Balancing Algorithm for E-Learning Platform by Data Grid Technologies
- Predicting Reliability of Software Using Thresholds of CK Metrics
- Analysis of Adaptive Group Key Management Protocol Using Network Simulator 2
- Deployment of Multicriteria Decision System for National Youth Service Corps (NYSC)
Last modified: 2015-12-03 18:42:43