Abstract

Recently, there is a leakage in the communication channel information by the cryptographic processors. It is the major chore to overcome the pouring out or spreading out of the secure data. In this paper, a new level of security analysis model is constructed in power analysis using Elliptic Curve Cryptography. And so many side channel attacks and their countermeasures are explained undeniably. An algorithm design based on power analysis is also described and it makes our countermeasure more secure against simple power analysis, differential power analysis and other attacks. The theoretical analysis based on these result has been shown and it represents how the algorithm design should fluctuate from the facade side channel attacks.

Highlights

  • Data are poured out by the cryptographic processors, as power consumption, electromagnetic emission and during the computing time of an encryption/decryption operation

  • Cryptographic attacks are based on the cipher text, by choosing the accurate key for capturing the plain text, but a days side channel attacks are focused in a different manner such as VLSI based on implementation of the cryptographic algorithm

  • We have shown a new level of security analysis model and explained a case study for power analysis attacks based on algorithm design

Read more

Summary

INTRODUCTION

Data are poured out by the cryptographic processors, as power consumption, electromagnetic emission and during the computing time of an encryption/decryption operation. These information leakages are known as side channel information. Side channel attacks are based on these side channel information. This paper gives a brief introduction about the side channel attacks and their countermeasures. As the base of proposed basic security analysis model, the levels of analysis attacks are compared to security levels. A brief case study of power analysis attacks and a special design based on countermeasure are explained clearly

ATTACKS
SIDE CHANNEL ATTACKS
COUNTERMEASURES
POWER ANALYSIS ATTACKS
Differential Power Analysis Attack
NOISE ANALYSIS ATTACK
VIII. FAULT ANALYSIS ATTACKS
TRAFFIC ANALYSIS ATTACK
TIMING ATTACK
Elliptic Curve Scalar Multiplication
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call