L. Sauvage, S. Guilley, J. Danger, N. Homma, Y. Hayashi
{"title":"基于fpga的RSA硬件实现电磁制图的实际效果","authors":"L. Sauvage, S. Guilley, J. Danger, N. Homma, Y. Hayashi","doi":"10.1109/ISEMC.2011.6038412","DOIUrl":null,"url":null,"abstract":"Side channel attack is a powerful technique to extracting secret key from cryptographic applications of embedded systems. Best results are obtained by placing a small electromagnetic probe just over areas of an integrated circuit which are leaking the most information. To find such locations, some cartography methods have been proposed in the past, but never used against asymmetric-key cryptosystems. In this paper, we target such cryptosystem, more precisely a FPGA-based RSA hardware implementation. We show that these methods are effective to locate the RSA cryptoprocessor.","PeriodicalId":440959,"journal":{"name":"2011 IEEE International Symposium on Electromagnetic Compatibility","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Practical results of EM cartography on a FPGA-based RSA hardware implementation\",\"authors\":\"L. Sauvage, S. Guilley, J. Danger, N. Homma, Y. Hayashi\",\"doi\":\"10.1109/ISEMC.2011.6038412\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Side channel attack is a powerful technique to extracting secret key from cryptographic applications of embedded systems. Best results are obtained by placing a small electromagnetic probe just over areas of an integrated circuit which are leaking the most information. To find such locations, some cartography methods have been proposed in the past, but never used against asymmetric-key cryptosystems. In this paper, we target such cryptosystem, more precisely a FPGA-based RSA hardware implementation. We show that these methods are effective to locate the RSA cryptoprocessor.\",\"PeriodicalId\":440959,\"journal\":{\"name\":\"2011 IEEE International Symposium on Electromagnetic Compatibility\",\"volume\":\"58 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-10-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 IEEE International Symposium on Electromagnetic Compatibility\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISEMC.2011.6038412\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE International Symposium on Electromagnetic Compatibility","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISEMC.2011.6038412","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Practical results of EM cartography on a FPGA-based RSA hardware implementation
Side channel attack is a powerful technique to extracting secret key from cryptographic applications of embedded systems. Best results are obtained by placing a small electromagnetic probe just over areas of an integrated circuit which are leaking the most information. To find such locations, some cartography methods have been proposed in the past, but never used against asymmetric-key cryptosystems. In this paper, we target such cryptosystem, more precisely a FPGA-based RSA hardware implementation. We show that these methods are effective to locate the RSA cryptoprocessor.