Side-Channel Attacks

Pankaj Rohatgi, IBM T. J. Watson Research Center

Introduction

Timing Attacks

Timing Attack Example

Extensions, Countermeasures, and Further Reading

Power Analysis Attacks

Information Within Power Consumption Signals

Simple Power Analysis

Differential Power Analysis

EM Analysis

Understanding EM Emanations

EM Attack Equipment

EM Attacks on an RSA Accelerator

Multiplicity of EM Channels

Advanced Side-Channel Analysis Techniques

Template Attacks

Template Attack Technique

Template Attack on RC4

Countermeasures

Further Reading

Reverse Engineering Using Side Channels: First Steps

Combining Side Channels with Invasive or Fault Attacks

Active Side-Channel Attacks

Combining Classical and Side-Channel Cryptanalysis

Connections Between Side-Channel and Covert-Channel Analysis

Glossary

Cross References

References

INTRODUCTION

Maintaining information integrity and confidentiality is a core security requirement in most systems. These goals are typically realized using a combination of techniques such as authentication, discretionary and mandatory access control, use of high-assurance trusted components, encryption, integrity tags, and secure communication protocols.

In most commercial environments, however, these generic techniques are applied and analyzed only with respect to an abstract model of the system being protected. Thus, gaps between the model and actual implementation can open up a system to attacks that its designers never anticipated. Poorly designed and implemented ...

Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.