This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Generalizations to multiple observations and more than two hypotheses are straightforward.
- 2.
We omit the derivation of these estimators as the derivation is tedious and follows from straight-forward algebraic manipulations.
- 3.
The slight offset in time is due to delay of EM signals with respect to the power signal.
- 4.
For simplicity, this chapter deals with independent elementary operation invocations. Techniques also exist for adaptive invocations.
References
O. Aciicmez, Ç. K. Koç, and J.-P. Seifert. Predicting secret keys via branch prediction. In M. Abe editor, Topics in Cryptology CT-RSA 2007, The Cryptographers Track at the RSA Conference 2007, pp. 225–242, Springer-Verlag, Lecture Notes in Computer Science series 4377, 2007.
D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi. The EM side-channel(s). In B. Kaliski, Ç. K. Koç, and C. Paar editors, Proceedings of CHES 2002. Lecture Notes in Computer Science, vol. 2523, pp. 29–45, Springer, 2002.
D. Agrawal, J. R. Rao, P. Rohatgi, and K. Schramm. Templates as Master Keys. In J. R. Rao and B. Sunar editors, Proceedings of CHES 2005, Lecture Notes in Computer Science, vol. 3659, pp. 15–29, Springer, 2005.
D. Asinov and R. Agrawal. Keyboard acoustic emanations. In Proceeding of the IEEE Symposium on Security and Privacy 2004, pp. 3–11, 2004.
D. J. Bernstein. Cache-timing attacks on AES. Technical Report, p. 37, April 2005, available at http://cr.yp.to/antiforgery/cachetiming- 20050414.pdf
S. Chari, J. R. Rao, and P. Rohatgi. Template attacks. In B. Kaliski, Ç. K. Koç, and C. Paar editors, Proceedings of CHES 2002, Lecture Notes in Computer Science, vol. 2523, pp. 13–28 Springer, 2002.
K. Gandolfi, C. Mourtel, and F. Olivier. Electromagnetic analysis: Concrete results. In Ç. K. Koç, D. Naccache, and C. Paar editors, Proceedings of CHES 2001, Lecture Notes in Computer Science, vol. 2162, pp. 251–261, Springer, 2001.
P. C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In N. Koblitz editor, Advances in Cryptology – CRYPTO ’96, Lecture Notes in Computer Science, vol. 1109, pp. 104–113, Springer-Verlag, 1996.
P. C. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In M. Wiener editor, Proceedings of Advances in Cryptology CRYPTO ’99, Lecture Notes in Computer Science, vol. 1666, pp. 388–397, Springer-Verlag, 1999.
M. Kuhn. Optical Time-domain eavesdropping risks of CRT displays. In Proceedings of the Symposium on Security and Privacy, pp. 3–18, 2002.
J. Loughry and D. Umphress. Information leakage from optical emanations. In ACM Transactions on Information and System Security, vol. 5, pp. 262–289, 2002.
D. A. Osvik, A. Shamir, and E. Tromer. Cache attacks and countermeasures: The case of AES. In D. Pointcheval editor, Topics in Cryptology CT-RSA 2006, The Cryptographers Track at the RSA Conference 2006, pp. 1–20, Lecture Notes in Computer Science, vol. 3860, Springer-Verlag, 2006.
C. Percival. Cache missing for fun and profit. In BSDCan 2005, Ottawa, 2005, available at http://www.daemonology.net/hyperthreading-considered-harmful/
J.-J. Quisquater and D. Samyde. Electromagnetic analysis (EMA): Measures and countermeasures for smart cards. In Proceedings of e-Smart 2001, Lectures Notes in Computer Science (LNCS), vol. 2140, pp. 200–210, Springer, 2001.
H. L. Van Trees. Detection, Estimation, and Modulation Theory, Part I. John Wiley & Sons, New York, 1968.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Rohatgi, P. (2009). Improved Techniques for Side-Channel Analysis. In: Koç, Ç.K. (eds) Cryptographic Engineering. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-71817-0_14
Download citation
DOI: https://doi.org/10.1007/978-0-387-71817-0_14
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-71816-3
Online ISBN: 978-0-387-71817-0
eBook Packages: EngineeringEngineering (R0)