Analysis of Electromagnetic Information Leakage Based on Cryptographic Integrated Circuits - PubMed Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2021 Nov 13;23(11):1508.
doi: 10.3390/e23111508.

Analysis of Electromagnetic Information Leakage Based on Cryptographic Integrated Circuits

Affiliations

Analysis of Electromagnetic Information Leakage Based on Cryptographic Integrated Circuits

Shaofei Sun et al. Entropy (Basel). .

Abstract

Cryptographic algorithm is the most commonly used method of information security protection for many devices. The secret key of cryptographic algorithm is usually stored in these devices' registers. In this paper, we propose an electromagnetic information leakage model to investigate the relationship between the electromagnetic leakage signal and the secret key. The registers are considered as electric dipole models to illustrate the source of the electromagnetic leakage. The equivalent circuit of the magnetic field probe is developed to bridge the output voltage and the electromagnetic leakage signal. Combining them, the electromagnetic information leakage model's function relationship can be established. Besides, an electromagnetic leakage model based on multiple linear regression is proposed to recover the secret key and the model's effectiveness is evaluated by guess entropy. Near field tests are conducted in an unshielded ordinary indoor environment to investigate the electromagnetic side-channel information leakage. The experiment result shows the correctness of the proposed electromagnetic leakage model and it can be used to recover the secret key of the cryptographic algorithm.

Keywords: electromagnetic leakage; electromagnetic side-channel analysis; guess entropy; integrated circuits; multiple linear regression.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
Experiment Platform.
Figure 2
Figure 2
Hardware Implementation of AES.
Figure 3
Figure 3
One of the measured electromagnetic trace.
Figure 4
Figure 4
The main process of electromagnetic leakage process.
Figure 5
Figure 5
The CMOS Inverter.
Figure 6
Figure 6
The Electric Dipole.
Figure 7
Figure 7
The Equivalent Circuit for Magnetic Probe.
Figure 8
Figure 8
The determination coefficient of different key candidates.
Figure 9
Figure 9
The p value of different key candidates.
Figure 10
Figure 10
The relationship between determination coefficient and trace number.
Figure 11
Figure 11
The guess entropy of the proposed model in different trace number.

Similar articles

Cited by

References

    1. Kocher P.C. Annual International Cryptology Conference. Springer; Berlin/Heidelberg, Germany: 1996. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems; pp. 104–113.
    1. Xiang Y., Chen Z., Chen Z., Fang Z., Hao H., Chen J., Liu Y., Wu Z., Xuan Q., Yang X. Open dnn box by power side-channel attack. IEEE Trans. Circuits Syst. II Express Briefs. 2020;67:2717–2721. doi: 10.1109/TCSII.2020.2973007. - DOI
    1. Xiang Y., Xu Y., Li Y., Ma W., Xuan Q., Liu Y. Side-channel gray-box attack for dnns. IEEE Trans. Circuits Syst. II Express Briefs. 2020;68:501–505. doi: 10.1109/TCSII.2020.3012005. - DOI
    1. Yang W., Cao Y., Zhou Y., Zhang H., Zhang Q. Distance based leakage alignment for side channel attacks. IEEE Signal Process. Lett. 2016;23:419–423. doi: 10.1109/LSP.2016.2521441. - DOI
    1. Slater D., Novotney S., Moore J., Morgan S., Tenaglia S. Robust keystroke transcription from the acoustic side-channel; Proceedings of the 35th Annual Computer Security Applications Conference; San Juan, PR, USA. 9–13 December 2019; pp. 776–787.

LinkOut - more resources