ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Overview of the Side Channel Attacks

Journal: International Journal of Advanced Networking and Applications (Vol.4, No. 06)

Publication Date:

Authors : ;

Page : 1799-1808

Keywords : Side-Channel Attacks; Simple Power Analysis Attacks; Differential Power Analysis Attacks;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The security of cryptographic algorithms such as block ciphers and public-key algorithms relies on the secrecy of the key. Traditionally, when cryptanalysists examine the security of a cryptographic algorithm, they try to recover the secret key by observing the inputs and outputs of the algorithm. Assuming this type of attack models, cryptologists have made commonly-used cryptographic algorithms secure against such attacks. However, a real computing device not only generates the outputs specified in algorithms but also inevitably produces some other information such as timing and power. These types of information, called side-channel information, can be exploited in side-channel attacks to retrieve secret keys. Side channel attacks have successfully broken many algorithms.

Last modified: 2015-12-03 18:42:43