An Analysis of Information Leakage from a Cryptographic Hardware via Common-Mode Current

نویسندگان

  • Yu-ichi Hayashi
  • Takeshi Sugawara
  • Yoshiki Kayano
  • Naofumi Homma
  • Takaaki Mizuki
  • Akashi Satoh
  • Takafumi Aoki
  • Shigeki Minegishi
  • Hideaki Sone
  • Hiroshi Inoue
چکیده

This paper analyzes the propagation of information leaked from cryptographic modules via common-mode current. We propose a simple board model in order to discuss the leakage mechanism in a general manner. Our simulation and experimental results show that the frequency characteristic of the proposed board model agrees rather well with those of a real cryptographic board. Based on these results, we propose that there needs to be a discussion on security countermeasures from the view of both EMC and side channel attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Space Vector Modulation Technique to Reduce Leakage Current of a Transformerless Three-Phase Four-Leg Photovoltaic System

Photovoltaic systems integrated to the grid have received considerable attention around the world. They can be connected to the electrical grid via galvanic isolation (transformer) or without it (transformerless). Despite making galvanic isolation, low frequency transformer increases size, cost and losses. On the other hand, transformerless PV systems increase the leakage current (common-mode c...

متن کامل

Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives

Linear diffusion layer is an important part of lightweight block ciphers and hash functions. This paper presents an efficient class of lightweight 4x4 MDS matrices such that the implementation cost of them and their corresponding inverses are equal. The main target of the paper is hardware oriented cryptographic primitives and the implementation cost is measured in terms of the required number ...

متن کامل

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

Design of A Single-Phase Transformerless Grid-Connected PV Inverter ‎Considering Reduced Leakage Current and LVRT Grid Codes

A new single-phase transformerless grid-connected PV inverter is presented in this paper. Investigations in transformerless grid-connected PV inverters indicate the existence of the leakage current is directly related to the variable common-mode voltage (CMV), which is presented in detail. On the other hand, in recent years it has become mandatory for the transformerless grid-connected PV inver...

متن کامل

Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software

Malicious alterations of integrated circuits (ICs), introduced during either the design or fabrication process, are increasingly perceived as a serious concern by the global semiconductor industry. Such rogue alterations often take the form of a “hardware Trojan,” which may be activated from remote after the compromised chip or system has been deployed in the field. The devious actions of hardw...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009