{"title":"Side Channel Attacks Cryptanalysis against Block Ciphers Based on FPGA Devices","authors":"A. Bechtsoudis, N. Sklavos","doi":"10.1109/ISVLSI.2010.104","DOIUrl":null,"url":null,"abstract":"The block cipher designers assume that the secret information will be manipulated in close and reliable computing environments. Unfortunately, this isn’t feasible because actual computing units and chips have implementation information leakage during their operation. Side channel cryptanalysis exploits this implementation data, in order to extract cipher’s secret information. In this paper, we discuss the current state-of-art of side channel cryptanalysis. We also analyze the different categories of side channel attacks and examine how concrete attacks against FPGA devices leads to secret information reveal.","PeriodicalId":187530,"journal":{"name":"2010 IEEE Computer Society Annual Symposium on VLSI","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE Computer Society Annual Symposium on VLSI","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISVLSI.2010.104","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 19
Abstract
The block cipher designers assume that the secret information will be manipulated in close and reliable computing environments. Unfortunately, this isn’t feasible because actual computing units and chips have implementation information leakage during their operation. Side channel cryptanalysis exploits this implementation data, in order to extract cipher’s secret information. In this paper, we discuss the current state-of-art of side channel cryptanalysis. We also analyze the different categories of side channel attacks and examine how concrete attacks against FPGA devices leads to secret information reveal.