Skip to main content

Improved Techniques for Side-Channel Analysis

  • Chapter

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Generalizations to multiple observations and more than two hypotheses are straightforward.

  2. 2.

    We omit the derivation of these estimators as the derivation is tedious and follows from straight-forward algebraic manipulations.

  3. 3.

    The slight offset in time is due to delay of EM signals with respect to the power signal.

  4. 4.

    For simplicity, this chapter deals with independent elementary operation invocations. Techniques also exist for adaptive invocations.

References

  1. O. Aciicmez, Ç. K. Koç, and J.-P. Seifert. Predicting secret keys via branch prediction. In M. Abe editor, Topics in Cryptology CT-RSA 2007, The Cryptographers Track at the RSA Conference 2007, pp. 225–242, Springer-Verlag, Lecture Notes in Computer Science series 4377, 2007.

    Google Scholar 

  2. D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi. The EM side-channel(s). In B. Kaliski, Ç. K. Koç, and C. Paar editors, Proceedings of CHES 2002. Lecture Notes in Computer Science, vol. 2523, pp. 29–45, Springer, 2002.

    Google Scholar 

  3. D. Agrawal, J. R. Rao, P. Rohatgi, and K. Schramm. Templates as Master Keys. In J. R. Rao and B. Sunar editors, Proceedings of CHES 2005, Lecture Notes in Computer Science, vol. 3659, pp. 15–29, Springer, 2005.

    Google Scholar 

  4. D. Asinov and R. Agrawal. Keyboard acoustic emanations. In Proceeding of the IEEE Symposium on Security and Privacy 2004, pp. 3–11, 2004.

    Google Scholar 

  5. D. J. Bernstein. Cache-timing attacks on AES. Technical Report, p. 37, April 2005, available at http://cr.yp.to/antiforgery/cachetiming- 20050414.pdf

  6. S. Chari, J. R. Rao, and P. Rohatgi. Template attacks. In B. Kaliski, Ç. K. Koç, and C. Paar editors, Proceedings of CHES 2002, Lecture Notes in Computer Science, vol. 2523, pp. 13–28 Springer, 2002.

    Google Scholar 

  7. K. Gandolfi, C. Mourtel, and F. Olivier. Electromagnetic analysis: Concrete results. In Ç. K. Koç, D. Naccache, and C. Paar editors, Proceedings of CHES 2001, Lecture Notes in Computer Science, vol. 2162, pp. 251–261, Springer, 2001.

    Google Scholar 

  8. P. C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In N. Koblitz editor, Advances in Cryptology – CRYPTO ’96, Lecture Notes in Computer Science, vol. 1109, pp. 104–113, Springer-Verlag, 1996.

    Google Scholar 

  9. P. C. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In M. Wiener editor, Proceedings of Advances in Cryptology CRYPTO ’99, Lecture Notes in Computer Science, vol. 1666, pp. 388–397, Springer-Verlag, 1999.

    Google Scholar 

  10. M. Kuhn. Optical Time-domain eavesdropping risks of CRT displays. In Proceedings of the Symposium on Security and Privacy, pp. 3–18, 2002.

    Google Scholar 

  11. J. Loughry and D. Umphress. Information leakage from optical emanations. In ACM Transactions on Information and System Security, vol. 5, pp. 262–289, 2002.

    Article  Google Scholar 

  12. D. A. Osvik, A. Shamir, and E. Tromer. Cache attacks and countermeasures: The case of AES. In D. Pointcheval editor, Topics in Cryptology CT-RSA 2006, The Cryptographers Track at the RSA Conference 2006, pp. 1–20, Lecture Notes in Computer Science, vol. 3860, Springer-Verlag, 2006.

    Chapter  Google Scholar 

  13. C. Percival. Cache missing for fun and profit. In BSDCan 2005, Ottawa, 2005, available at http://www.daemonology.net/hyperthreading-considered-harmful/

  14. J.-J. Quisquater and D. Samyde. Electromagnetic analysis (EMA): Measures and countermeasures for smart cards. In Proceedings of e-Smart 2001, Lectures Notes in Computer Science (LNCS), vol. 2140, pp. 200–210, Springer, 2001.

    Google Scholar 

  15. H. L. Van Trees. Detection, Estimation, and Modulation Theory, Part I. John Wiley & Sons, New York, 1968.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pankaj Rohatgi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Rohatgi, P. (2009). Improved Techniques for Side-Channel Analysis. In: Koç, Ç.K. (eds) Cryptographic Engineering. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-71817-0_14

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-71817-0_14

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-71816-3

  • Online ISBN: 978-0-387-71817-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics