Ersin Hatun, Gokhan Kaya, Elif Buyukkaya, S. Yalcin
{"title":"在树莓派上实现的RSA算法的EM辐射侧信道分析","authors":"Ersin Hatun, Gokhan Kaya, Elif Buyukkaya, S. Yalcin","doi":"10.1109/ISNCC.2019.8909185","DOIUrl":null,"url":null,"abstract":"The side-channel information (power consumption, electromagnetic radiation, etc.) leaked unintentionally from a cryptographic system during a cryptographic process can be used by attackers to reveal secret data using side-channel analysis. Some of the most common side-channel analysis are SPA (Simple Power Analysis), DPA (Differential Power Analysis), SEMA (Simple Electromagnetic Analysis) and DEMA (Differential Electromagnetic Analysis). Although it is relatively easy to analyze the side-channel information obtained from the ASIC or FPGA implementations, the analysis of a side channel information of cryptographic operations running in an operating system (OS) has different difficulties - for example, alignment of measurements and extracting crypto process signal through noises of other OS operations. In this study, side-channel attacks are performed against two different realizations of the RSA Algorithm by using electromagnetic radiation related with power consumption of a cryptographic operation implemented on Raspberry Pi platform. The first realization of the RSA Algorithm is implemented using unprotected binary algorithm and then private key bits of the RSA Algorithm are get individually by using SEMA attack. For the second realization, the RSA Algorithm is implemented by using a protected binary algorithm in order to resist against to SEMA attack. In presented work, the first bit of the private key has been found using 1800 measurements with the distance of mean test and correlation analysis.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Side Channel Analysis Using EM Radiation of RSA Algorithm Implemented on Raspberry Pi\",\"authors\":\"Ersin Hatun, Gokhan Kaya, Elif Buyukkaya, S. Yalcin\",\"doi\":\"10.1109/ISNCC.2019.8909185\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The side-channel information (power consumption, electromagnetic radiation, etc.) leaked unintentionally from a cryptographic system during a cryptographic process can be used by attackers to reveal secret data using side-channel analysis. Some of the most common side-channel analysis are SPA (Simple Power Analysis), DPA (Differential Power Analysis), SEMA (Simple Electromagnetic Analysis) and DEMA (Differential Electromagnetic Analysis). Although it is relatively easy to analyze the side-channel information obtained from the ASIC or FPGA implementations, the analysis of a side channel information of cryptographic operations running in an operating system (OS) has different difficulties - for example, alignment of measurements and extracting crypto process signal through noises of other OS operations. In this study, side-channel attacks are performed against two different realizations of the RSA Algorithm by using electromagnetic radiation related with power consumption of a cryptographic operation implemented on Raspberry Pi platform. The first realization of the RSA Algorithm is implemented using unprotected binary algorithm and then private key bits of the RSA Algorithm are get individually by using SEMA attack. For the second realization, the RSA Algorithm is implemented by using a protected binary algorithm in order to resist against to SEMA attack. In presented work, the first bit of the private key has been found using 1800 measurements with the distance of mean test and correlation analysis.\",\"PeriodicalId\":187178,\"journal\":{\"name\":\"2019 International Symposium on Networks, Computers and Communications (ISNCC)\",\"volume\":\"108 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Symposium on Networks, Computers and Communications (ISNCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISNCC.2019.8909185\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISNCC.2019.8909185","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Side Channel Analysis Using EM Radiation of RSA Algorithm Implemented on Raspberry Pi
The side-channel information (power consumption, electromagnetic radiation, etc.) leaked unintentionally from a cryptographic system during a cryptographic process can be used by attackers to reveal secret data using side-channel analysis. Some of the most common side-channel analysis are SPA (Simple Power Analysis), DPA (Differential Power Analysis), SEMA (Simple Electromagnetic Analysis) and DEMA (Differential Electromagnetic Analysis). Although it is relatively easy to analyze the side-channel information obtained from the ASIC or FPGA implementations, the analysis of a side channel information of cryptographic operations running in an operating system (OS) has different difficulties - for example, alignment of measurements and extracting crypto process signal through noises of other OS operations. In this study, side-channel attacks are performed against two different realizations of the RSA Algorithm by using electromagnetic radiation related with power consumption of a cryptographic operation implemented on Raspberry Pi platform. The first realization of the RSA Algorithm is implemented using unprotected binary algorithm and then private key bits of the RSA Algorithm are get individually by using SEMA attack. For the second realization, the RSA Algorithm is implemented by using a protected binary algorithm in order to resist against to SEMA attack. In presented work, the first bit of the private key has been found using 1800 measurements with the distance of mean test and correlation analysis.