TY - JOUR
T1 - Information Leakage Threats for Cryptographic Devices Using IEMI and em Emission
AU - Nakamura, Ko
AU - Hayashi, Yu Ichi
AU - Mizuki, Takaaki
AU - Sone, Hideaki
N1 - Funding Information:
Manuscript received September 6, 2017; accepted September 28, 2017. Date of publication November 27, 2017; date of current version May 29, 2018. This work was supported by JSPS KAKENHI under Grant 16H02831 and Grant 17H01751. (Corresponding author: Yu-ichi Hayashi.) K. Nakamura and Y.-i. Hayashi are with the Nara Institute of Science and Technology, Nara 630-0192, Japan (e-mail: nakamura.ko.nh3@is.naist.jpc; yu-ichi@is.naist.jp). T. Mizuki and H. Sone are with Tohoku University, Sendai 980-8577, Japan. Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TEMC.2017.2766139
Publisher Copyright:
© 2017 IEEE.
PY - 2018/10
Y1 - 2018/10
N2 - In this paper, we present a new information leakage threat combining intentional electromagnetic interference (IEMI) and observations of EM leakage. In previous studies, the analysis of secret key information in cryptographic modules using fault injection has led to methods whereby faults can be injected via low-voltage IEMI. However, the timing of fault injections cannot be controlled with this approach, and it is difficult to obtain faulty ciphertexts for use in secret key analysis by differential fault analysis (DFA). To overcome this problem, we propose a method for estimating the fault-injection timing by detecting characteristic fluctuations in the EM leakage from the device. As a result, it may be possible to implement a realistic secret information analysis method applicable to a wide range of devices. First, to show the feasibility of the proposed method, we describe an experiment using an on-chip fault-injection circuit that can control the injection timing. Furthermore, we apply a fault analysis method that combines the injection timing estimation method and fault injection by IEMI in a practical experimental environment. We select useful faulty ciphertexts using the proposed method, and then perform secret key analysis by DFA. Experimental results demonstrate that the secret key can be successfully analyzed.
AB - In this paper, we present a new information leakage threat combining intentional electromagnetic interference (IEMI) and observations of EM leakage. In previous studies, the analysis of secret key information in cryptographic modules using fault injection has led to methods whereby faults can be injected via low-voltage IEMI. However, the timing of fault injections cannot be controlled with this approach, and it is difficult to obtain faulty ciphertexts for use in secret key analysis by differential fault analysis (DFA). To overcome this problem, we propose a method for estimating the fault-injection timing by detecting characteristic fluctuations in the EM leakage from the device. As a result, it may be possible to implement a realistic secret information analysis method applicable to a wide range of devices. First, to show the feasibility of the proposed method, we describe an experiment using an on-chip fault-injection circuit that can control the injection timing. Furthermore, we apply a fault analysis method that combines the injection timing estimation method and fault injection by IEMI in a practical experimental environment. We select useful faulty ciphertexts using the proposed method, and then perform secret key analysis by DFA. Experimental results demonstrate that the secret key can be successfully analyzed.
KW - Electromagnetic (EM) information leakage
KW - fault analysis
KW - fault-injection timing
KW - intentional electromagnetic interference (IEMI)
UR - http://www.scopus.com/inward/record.url?scp=85038371573&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85038371573&partnerID=8YFLogxK
U2 - 10.1109/TEMC.2017.2766139
DO - 10.1109/TEMC.2017.2766139
M3 - Article
AN - SCOPUS:85038371573
SN - 0018-9375
VL - 60
SP - 1340
EP - 1347
JO - IEEE Transactions on Electromagnetic Compatibility
JF - IEEE Transactions on Electromagnetic Compatibility
IS - 5
ER -