[go: up one dir, main page]

Gandolfi et al., 2001 - Google Patents

Electromagnetic analysis: Concrete results

Gandolfi et al., 2001

View PDF
Document ID
206183976725068111
Author
Gandolfi K
Mourtel C
Olivier F
Publication year
Publication venue
International workshop on cryptographic hardware and embedded systems

External Links

Snippet

Although the possibility of attacking smart-cards by analyzing their electromagnetic power radiation repeatedly appears in research papers, all accessible references evade the essence of reporting conclusive experiments where actual cryptographic algorithms such as …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer

Similar Documents

Publication Publication Date Title
Gandolfi et al. Electromagnetic analysis: Concrete results
Sayakkara et al. A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics
Becker et al. Stealthy dopant-level hardware trojans
Peeters et al. Power and electromagnetic analysis: Improved model, consequences and comparisons
Bhasin et al. Hardware Trojan horses in cryptographic IP cores
Tehranipoor et al. A survey of hardware trojan taxonomy and detection
EP1252561B1 (en) Microprocessor resistant to power analysis
Joy Persial et al. Side channel attack-survey
Sauvage et al. Electromagnetic radiations of fpgas: High spatial resolution cartography and attack on a cryptographic module
Hutter et al. RFID and its vulnerability to faults
Tiu A new frequency-based side channel attack for embedded systems
Barenghi et al. Exploring the feasibility of low cost fault injection attacks on sub-threshold devices through an example of a 65nm aes implementation
Rohatgi Electromagnetic attacks and countermeasures
Rae et al. A taxonomy of attacks on secure devices
Hamdioui et al. Hacking and protecting IC hardware
Lakshminarasimhan Electromagnetic side-channel analysis for hardware and software watermarking
Kufel et al. Sequence-aware watermark design for soft IP embedded processors
Leng Smart card applications and security
De Mulder Electromagnetic techniques and probes for side-channel analysis on cryptographic devices
Gao et al. Eo-shield: A multi-function protection scheme against side channel and focused ion beam attacks
Matthews Low cost attacks on smart cards: the electromagnetic sidechannel
Tehranipoor et al. EM Side-Channel Attack on AES
US20170373837A1 (en) Protection method and device against a side-channel analysis
Shao et al. Fast and automatic security test on cryptographic ICs against fault injection attacks based on design for security test
Hogenboom et al. Principal component analysis and side-channel attacks-master thesis