Abstract
In this paper, DEMA (Differential Electromagnetic Analysis) attack, which is one of the differential side channel analysis methods, is applied to the AES algorithm running on the Raspberry Pi. Raspberry Pi's operating system is not a simple operating system. Due to the fact that it is a mini computer, while Raspberry Pi is doing an operation, operating system are being performed simultaneously. The noise of the routine system of the operating system was observed, and the variance of the process time was observed when encryption or decryption was performed with AES. The encryption time is unpredictable and the routine operating system process has made it difficult to analyze measurements. In this study, it was investigated whether using Raspberry Pi platform is a measure against direct side channel analysis. At the end of the analysis, the algorithm is seen no to withstand the side channel attack because of secret key obtained. It is proposed to implement a software-based measure in the AES algorithm or a software / hardware measure to be added to Raspberry Pi.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.