Why Cryptography Should Not Rely on Physical Attack Complexity by Juliane Krämer
Author:Juliane Krämer
Language: eng
Format: epub
Publisher: Springer Singapore, Singapore
For a photonic side channel attack, it is helpful to have more information about the targeted components. It is interesting to know the relation between the inverters and the individual bits they process and represent. We determined the bit order of the inverters by analyzing emission images. The bit order is shown in Fig. 4.5a. Due to the IC’s layout, the inverters form two groups, the five msb and the three lsb. Because of the distance between the two groups and the additional enable and clock signals that lie between them, measuring the emissions of both groups in a single trace would imply too much noise. Therefore, we chose to measure the 5 msb and the 3 lsb separately. The position and approximate aperture of the measurements is shown in Fig. 4.5b. We denote the respective sets of measurements with , i.e., denotes the set of the traces captured at the chip’s msb, and accordingly denotes the set of the traces captured at the chip’s lsb. To capture all traces, we needed 26 h with the first setup. Each of these traces consists of 1,000,000 averaged measurements. Since this setup required to be used in gated operation, in fact even more than 1,000,000 measurements were needed. Given that each trace was composed of 20 measurements, 20,000,000 measurements were necessary for a single trace.Table 4.8Assembly code of the AES SubBytes Operation
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(25283)
Hello! Python by Anthony Briggs(24336)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23429)
Kotlin in Action by Dmitry Jemerov(22506)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21969)
Dependency Injection in .NET by Mark Seemann(21838)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20707)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19520)
Grails in Action by Glen Smith Peter Ledbrook(18602)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17031)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15840)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13690)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11851)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10621)
Hit Refresh by Satya Nadella(9188)
The Kubernetes Operator Framework Book by Michael Dame(8564)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8400)
Robo-Advisor with Python by Aki Ranin(8360)