L. Sauvage, S. Guilley, J. Danger, N. Homma, Y. Hayashi
{"title":"Practical results of EM cartography on a FPGA-based RSA hardware implementation","authors":"L. Sauvage, S. Guilley, J. Danger, N. Homma, Y. Hayashi","doi":"10.1109/ISEMC.2011.6038412","DOIUrl":null,"url":null,"abstract":"Side channel attack is a powerful technique to extracting secret key from cryptographic applications of embedded systems. Best results are obtained by placing a small electromagnetic probe just over areas of an integrated circuit which are leaking the most information. To find such locations, some cartography methods have been proposed in the past, but never used against asymmetric-key cryptosystems. In this paper, we target such cryptosystem, more precisely a FPGA-based RSA hardware implementation. We show that these methods are effective to locate the RSA cryptoprocessor.","PeriodicalId":440959,"journal":{"name":"2011 IEEE International Symposium on Electromagnetic Compatibility","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE International Symposium on Electromagnetic Compatibility","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISEMC.2011.6038412","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
Side channel attack is a powerful technique to extracting secret key from cryptographic applications of embedded systems. Best results are obtained by placing a small electromagnetic probe just over areas of an integrated circuit which are leaking the most information. To find such locations, some cartography methods have been proposed in the past, but never used against asymmetric-key cryptosystems. In this paper, we target such cryptosystem, more precisely a FPGA-based RSA hardware implementation. We show that these methods are effective to locate the RSA cryptoprocessor.