Abstract

In this paper, DEMA (Differential Electromagnetic Analysis) attack, which is one of the differential side channel analysis methods, is applied to the AES algorithm running on the Raspberry Pi. Raspberry Pi's operating system is not a simple operating system. Due to the fact that it is a mini computer, while Raspberry Pi is doing an operation, operating system are being performed simultaneously. The noise of the routine system of the operating system was observed, and the variance of the process time was observed when encryption or decryption was performed with AES. The encryption time is unpredictable and the routine operating system process has made it difficult to analyze measurements. In this study, it was investigated whether using Raspberry Pi platform is a measure against direct side channel analysis. At the end of the analysis, the algorithm is seen no to withstand the side channel attack because of secret key obtained. It is proposed to implement a software-based measure in the AES algorithm or a software / hardware measure to be added to Raspberry Pi.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call