Side Channel Attacks and Their Mitigation Techniques

被引:0
|
作者
Khan, Ajoy Kumar [1 ]
Mahanta, Hridoy Jyoti [1 ]
机构
[1] Assam Univ, Dept Informat Technol, Silchar, India
关键词
cryptographic devic; AES; DES; Power Analysis; SPA; DPA;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Side channel cryptanalysis is one of the most volatile fields of research in security prospects. It has proved that cryptanalysis is no more confined to its dependence on plain text or cipher text. Indeed side channel attack uses the physical characteristics of the cryptographic device to find the cryptographic algorithm used and also the secret key. It is one of the most efficient techniques and has successfully broken almost all the cryptographic algorithms today. In this paper we aim to present a review on the various side channel attacks possible. Also, the techniques proposed to mitigate such an attack have been stated.
引用
收藏
页码:133 / 136
页数:4
相关论文
共 50 条
  • [41] Cache Side-Channel Attacks and Defenses
    Zhang W.
    Bai L.
    Ling Y.
    Lan X.
    Jia X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [42] Flexible exponentiation with resistance to side channel attacks
    Vuillaume, Camille
    Okeya, Katsuyuki
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2006, 3989 : 268 - 283
  • [43] Photonic Side Channel Attacks Against RSA
    Carmon, Elad
    Seifert, Jean-Pierre
    Wool, Avishai
    2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 74 - 78
  • [44] The Temperature Side Channel and Heating Fault Attacks
    Hutter, Michael
    Schmidt, Joern-Marc
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013), 2014, 8419 : 219 - +
  • [45] Side-Channel Attacks: A Short Tour
    Piessens, Frank
    van Oorschot, Paul C.
    Piessens, Frank
    van Oorshot, Paul C.
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 75 - 80
  • [46] Univariate side channel attacks and leakage modeling
    Doget, Julien
    Prouff, Emmanuel
    Rivain, Matthieu
    Standaert, Francois-Xavier
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (02) : 123 - 144
  • [47] Bernoulli at the Root of Horizontal Side Channel Attacks
    Cler, Gauthier
    Ordas, Sebastien
    Maurine, Philippe
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2023, 2024, 14530 : 107 - 126
  • [48] Cloud Computing Security Threats and Attacks with their Mitigation Techniques
    Amara, Naseer
    Huang Zhiqui
    Ali, Awais
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 244 - 251
  • [49] Attacks on Recent DNN IP Protection Techniques and Their Mitigation
    Mukherjee, Rijoy
    Chakraborty, Rajat Subhra
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 42 (11) : 3642 - 3650
  • [50] Review of Mitigation Techniques to Overcome Security Attacks on SDN
    Prasad, Gaurav
    Sharma, Devi Prasad
    PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 1505 - 1509