An Analysis of Information Leakage from a Cryptographic Hardware via Common-Mode Current
نویسندگان
چکیده
This paper analyzes the propagation of information leaked from cryptographic modules via common-mode current. We propose a simple board model in order to discuss the leakage mechanism in a general manner. Our simulation and experimental results show that the frequency characteristic of the proposed board model agrees rather well with those of a real cryptographic board. Based on these results, we propose that there needs to be a discussion on security countermeasures from the view of both EMC and side channel attack.
منابع مشابه
Space Vector Modulation Technique to Reduce Leakage Current of a Transformerless Three-Phase Four-Leg Photovoltaic System
Photovoltaic systems integrated to the grid have received considerable attention around the world. They can be connected to the electrical grid via galvanic isolation (transformer) or without it (transformerless). Despite making galvanic isolation, low frequency transformer increases size, cost and losses. On the other hand, transformerless PV systems increase the leakage current (common-mode c...
متن کاملLightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives
Linear diffusion layer is an important part of lightweight block ciphers and hash functions. This paper presents an efficient class of lightweight 4x4 MDS matrices such that the implementation cost of them and their corresponding inverses are equal. The main target of the paper is hardware oriented cryptographic primitives and the implementation cost is measured in terms of the required number ...
متن کاملDifferential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملDesign of A Single-Phase Transformerless Grid-Connected PV Inverter Considering Reduced Leakage Current and LVRT Grid Codes
A new single-phase transformerless grid-connected PV inverter is presented in this paper. Investigations in transformerless grid-connected PV inverters indicate the existence of the leakage current is directly related to the variable common-mode voltage (CMV), which is presented in detail. On the other hand, in recent years it has become mandatory for the transformerless grid-connected PV inver...
متن کاملHardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software
Malicious alterations of integrated circuits (ICs), introduced during either the design or fabrication process, are increasingly perceived as a serious concern by the global semiconductor industry. Such rogue alterations often take the form of a “hardware Trojan,” which may be activated from remote after the compromised chip or system has been deployed in the field. The devious actions of hardw...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009