TY - JOUR
T1 - Evaluation of information leakage from cryptographic hardware via common-mode current
AU - Hayashi, Yu Ichi
AU - Homma, Naofumi
AU - Mizuki, Takaaki
AU - Sugawara, Takeshi
AU - Kayano, Yoshiki
AU - Aoki, Takafumi
AU - Minegishi, Shigeki
AU - Satoh, Akashi
AU - Sone, Hideaki
AU - Inoue, Hiroshi
PY - 2012/6
Y1 - 2012/6
N2 - This paper presents a possibility of Electromagnetic (EM) analysis against cryptographic modules outside their security boundaries. The mechanism behind the information leakage is explained from the view point of Electromagnetic Compatibility: electric fluctuation released from cryptographic modules can conduct to peripheral circuits based on ground bounce, resulting in radiation. We demonstrate the consequence of the mechanism through experiments where the ISO/IEC standard block cipher AES (Advanced Encryption Standard) is implemented on an FPGA board and EM radiations from power and communication cables are measured. Correlation Electromagnetic Analysis (CEMA) is conducted in order to evaluate the information leakage. The experimental results show that secret keys are revealed even though there are various disturbing factors such as voltage regulators and AC/DC converters between the target module and the measurement points. We also discuss information-suppression techniques as electrical-level countermeasures against such CEMAs.
AB - This paper presents a possibility of Electromagnetic (EM) analysis against cryptographic modules outside their security boundaries. The mechanism behind the information leakage is explained from the view point of Electromagnetic Compatibility: electric fluctuation released from cryptographic modules can conduct to peripheral circuits based on ground bounce, resulting in radiation. We demonstrate the consequence of the mechanism through experiments where the ISO/IEC standard block cipher AES (Advanced Encryption Standard) is implemented on an FPGA board and EM radiations from power and communication cables are measured. Correlation Electromagnetic Analysis (CEMA) is conducted in order to evaluate the information leakage. The experimental results show that secret keys are revealed even though there are various disturbing factors such as voltage regulators and AC/DC converters between the target module and the measurement points. We also discuss information-suppression techniques as electrical-level countermeasures against such CEMAs.
KW - Common-mode currents
KW - Cryptographic modules
KW - Electromagnetic information leakage
KW - Information security
KW - Side-channel attacks
UR - http://www.scopus.com/inward/record.url?scp=84861823069&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84861823069&partnerID=8YFLogxK
U2 - 10.1587/transele.E95.C.1089
DO - 10.1587/transele.E95.C.1089
M3 - Article
AN - SCOPUS:84861823069
SN - 0916-8524
VL - E95-C
SP - 1089
EP - 1097
JO - IEICE Transactions on Electronics
JF - IEICE Transactions on Electronics
IS - 6
ER -