Abstract
Attacks on cryptographic devices and systems are rampant that leads to the weakening of information security protocols. Side- channel attacks (SCAs) being a major avenue of such attacks, utilizes the characteristic of the cryptographic devices for the sensitive information theft. Targets of attacks range from primitives, protocols, modules and devices to even major systems. Shielding the device or a system from such attacks and the consideration of the various compatible countermeasures for a specific application are a major concern. Reviews on different methods and strategies for suitable countermeasures on various side-channel attacks are presented in this paper. The feasibility for the practical implementation of few prominent countermeasures that can yield good resistance against these attacks is analysed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Willam, S.: Cryptography and Network Security: Principles and Practices. Pearson Education, India (2006)
Galbraith, S.D.: Mathematics of Public Key Cryptography. Cambridge University Press (2012)
Grah, J.S.: Hash functions in cryptography. Master thesis, Institute of Informatics, Department of Mathematics, University of Bergen, June 2008
Zhou, Y., Feng, D.: Side-channel attacks: ten years after its publication and the impacts on cryptographic module security testing. In: Information Security Seminar (2005)
Khan, A.K., Mahanta, H.J.: Side channel attacks and their mitigation techniques. In: First International Conference on Automation, Control, Energy and Systems (ACES) (2014)
Kang, Y.J., Bruce, N., Park, S., Lee, H.: A study on information security attack based side-channel attacks. In: 18th International Conference on Advanced Communication Technology (ICACT), Pyeongchang (2016)
Standaert, F.X.: Introduction to side-channel attacks. In: Verbauwhede, I.M.R. (ed.) Secure Integrated Circuits and Systems, pp. 27-42. Springer (2010)
Schneier, B.: Security pitfalls in cryptography. http://www.schneier.com/essay-pitfalls.html
Anderson, R., Bond, M., Clulow, J., Skorobogatov, S.: Cryptographic processors—a survey. Proc. IEEE 94(2), 357–369 (2006)
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO 1999, pp. 388–397. Springer, London (1999)
Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems. In: Koblitz, N. (ed.) The Proceedings of the 16th Annual International Conference on Advances in Cryptology (CRYPTO96), vol. 1109, pp. 104–113. Springer (1996)
Spadavecchia, L.: A network-based asynchronous architecture for cryptographic devices, (Thesis Submission) (2005)
Fleming, C., Cui, N., Liu, D., Liang, H.: Attacking random keypads through click timing analysis. In: International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 118–121 (2014)
Wang, W., Yu, Y., Standaert, F.X., Liu, J., Guo, Z., Gu, D.: Ridge-based DPA: improvement of differential power analysis for nanoscale chips. IEEE Trans. Inf. Forensics Secur. 13(5), 1301–1316 (2018)
Kabin, I., Dyka, Z., Kreiser, D., Langendoerfer, P.: Evaluation of resistance of ECC designs protected by different randomisation countermeasures against horizontal DPA attacks. In: IEEE East West design and Test Symposium (EWDTS) (2017)
Yu, W., Kse, S.: A voltage regulator-assisted lightweight AES implementation against DPA attacks. IEEE Trans. Circ. Syst. I Regular Papers 63(8), 1152–1163 (2016)
Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: CHES 2001, LNCS 2162, pp. 251–261 (2001)
Quisquater, J.J., Samyde, D.: Electromagnetic analysis (EMA): measures and countermeasures for smart cards. In: The Proceedings of the International Conference on Research in Smart Cards (E-smart 2001), vol. 2140-LNCS, pp. 200–210. Springer (2001)
Gu, K., Wu, L., Li, X., Zhang, X.M.: Design and implementation of an electromagnetic analysis system for smart cards. In: 2011 Seventh International Conference on Computational Intelligence and Security, Hainan, pp. 653–656 (2011)
Yang, B., Wu, K., Karri, R.: Scan-based side-channel attack on dedicated hardware implementations of data encryption standard. In: Proceedings of International Test Conference 2004 (ITC 2004), Charlotte, pp. 339–344 (2004)
Oku, D., Yanagisawa, M., Togawa, N.: A robust scan-based side-channel attack method against HMAC-SHA-256 circuits. In: 2017 IEEE 7th International Conference on Consumer Electronics-Berlin (ICCE-Berlin), Berlin, pp. 79–84 (2017)
Rolt, J.D., Di Natale, G., Flottes, M.L., Rouzeyre, B.: Thwarting scan-based attacks on secure-ICs with on-chip comparison. IEEE Trans. Very Large-Scale Integr. (VLSI) Syst. 22(4), 947–951 (2014)
Luo, Y., Cui, A., Qu, G., Li, H.: A new countermeasure against scan-based side-channel attacks. In: 2016 IEEE International Symposium on Circuits and Systems (ISCAS), Montreal, QC, pp. 1722–1725 (2016)
Namin, S.H., Mehta, A., Namin, P.H., Rashidzadeh, R., Ahmadi, M.: A secure test solution for sensor nodes containing crypto-cores. In: 2017 IEEE International Symposium on Circuits and Systems (ISCAS), Baltimore, MD, pp. 1–4 (2017)
Kelsey, J., Schneier, B., Wagner, D., Hall, C.: Side channel cryptanalysis of product ciphers. In: Proceedings of the 5th European Symposium on Research in Computer Security, LNCS 1485, pp. 97110 (1998)
Gajrani, J., Mazumdar, P., Sharma, S., Menezes, B.: Challenges in implementing cache-based side channel attacks on modern processors. In: 2014 27th International Conference on VLSI Design and 2014 13th International Conference on Embedded Systems, Mumbai, pp. 222–227 (2014)
Wright, P.: Spy Catcher: The Candid Autobiography of a Senior Intelligence Officer. Viking Press (1987)
Faruque, A., Abdullah, M., Chhetri, S.R., Canedo, A., Wan, J.: Acoustic side-channel attacks on additive manufacturing systems. In: 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS), Vienna, pp. 1–10 (2016)
Kuhn, M.G.: Optical time-domain eavesdropping risks of CRT displays. In: Proceedings 2002 IEEE Symposium on Security and Privacy, pp. 3–18 (2002)
Loughry, J., Umphress, D.: Information leakage from optical emanations. ACM Trans. Inf. Syst. Secur. 5, 262–289 (2002)
Tajik, S., Dietz, E., Frohmann, S., Dittrich, H., Nedospasov, D., Helfmeier, C., Seifert, J.P., Boit, C., Hübers, H.W.: Photonic Side Channel Analysis of Arbiter PUFs (2016)
Carmon, E., Seifert, J.P., Wool, A.: Photonic side channel attacks against RSA. In: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), McLean, VA, pp. 74–78 (2017)
Clavier, C., Feix, B., Gagnerot, G., Roussellet, M.: Passive and active combined attacks on AES combining fault attacks and side channel analysis. In: 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, Santa Barbara, CA, pp. 10–19 (2010)
Vaudenay, S.: Security flaws induced by CBC padding applications to SSL, IPSEC, WTLS. In: EUROCRYPT 2002, LNCS 2332, pp. 534–545 (2002)
Ha, Y., Jang, S.H., Kim, K.W., Yoon, J.W.: Side channel attack on digital door lock with vibration signal analysis: longer password does not guarantee higher security level. In: 2017 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI), Daegu, pp. 103–110 (2017)
TechDifferences.: Difference Between Active and Passive Attacks. (2008). https://techdifferences.com/difference-between-active-and-passive-attacks.html
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sravani, M.M., Ananiah Durai, S. (2019). Side-Channel Attacks on Cryptographic Devices and Their Countermeasures—A Review. In: Tiwari, S., Trivedi, M., Mishra, K., Misra, A., Kumar, K. (eds) Smart Innovations in Communication and Computational Sciences. Advances in Intelligent Systems and Computing, vol 851. Springer, Singapore. https://doi.org/10.1007/978-981-13-2414-7_21
Download citation
DOI: https://doi.org/10.1007/978-981-13-2414-7_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2413-0
Online ISBN: 978-981-13-2414-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)