Side Channel Attacks and Their Mitigation Techniques

被引:0
|
作者
Khan, Ajoy Kumar [1 ]
Mahanta, Hridoy Jyoti [1 ]
机构
[1] Assam Univ, Dept Informat Technol, Silchar, India
关键词
cryptographic devic; AES; DES; Power Analysis; SPA; DPA;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Side channel cryptanalysis is one of the most volatile fields of research in security prospects. It has proved that cryptanalysis is no more confined to its dependence on plain text or cipher text. Indeed side channel attack uses the physical characteristics of the cryptographic device to find the cryptographic algorithm used and also the secret key. It is one of the most efficient techniques and has successfully broken almost all the cryptographic algorithms today. In this paper we aim to present a review on the various side channel attacks possible. Also, the techniques proposed to mitigate such an attack have been stated.
引用
收藏
页码:133 / 136
页数:4
相关论文
共 50 条
  • [1] A Survey of of Side-Channel Attacks and Mitigation for Processor Interconnects
    Yuan, Jie
    Zhang, Jing
    Qiu, Pengfei
    Wei, Xinghai
    Liu, Dongxiao
    APPLIED SCIENCES-BASEL, 2024, 14 (15):
  • [2] Stratification of Hardware Attacks: Side Channel Attacks and Fault Injection Techniques
    Kaur S.
    Singh B.
    Kaur H.
    SN Computer Science, 2021, 2 (3)
  • [3] Side-Channel Payload Attacks: Modeling, Demonstration, and Mitigation Strategies
    Byerly, Adam
    Hennig, Anthony
    2024 IEEE AEROSPACE CONFERENCE, 2024,
  • [4] Applications of machine learning techniques in side-channel attacks: a survey
    Hettwer, Benjamin
    Gehrer, Stefan
    Gueneysu, Tim
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) : 135 - 162
  • [5] Applications of machine learning techniques in side-channel attacks: a survey
    Benjamin Hettwer
    Stefan Gehrer
    Tim Güneysu
    Journal of Cryptographic Engineering, 2020, 10 : 135 - 162
  • [6] Side Channel Attacks on GPUs
    Naghibijouybari, Hoda
    Neupane, Ajaya
    Qian, Zhiyun
    Abu-Ghazaleh, Nael
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (04) : 1950 - 1961
  • [8] Cloud Virtualization Attacks and Mitigation Techniques
    Ali, Syed Ahmed
    Memon, Shahzad
    Memon, Nisar
    ADVANCES IN CYBERSECURITY, CYBERCRIMES, AND SMART EMERGING TECHNOLOGIES, 2023, 4 : 147 - 159
  • [9] Circuits and design techniques for secure ICs resistant to side-channel attacks
    Verbauwhede, I.
    Tiri, K.
    Hwang, D.
    Schaumont, P.
    2006 IEEE INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUIT DESIGN AND TECHNOLOGY, PROCEEDINGS, 2006, : 57 - +
  • [10] Amplifying side-channel attacks with techniques from block cipher cryptanalysis
    Phan, Raphael C. -W.
    Yen, Sung-Ming
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2006, 3928 : 135 - 150