Paper 2005/388

Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing

YongBin Zhou and DengGuo Feng

Abstract

Side-channel attacks are easy-to-implement whilst powerful attacks against cryptographic implementations, and their targets range from primitives, protocols, modules, and devices to even systems. These attacks pose a serious threat to the security of cryptographic modules. In consequence, cryptographic implementations have to be evaluated for their resistivity against such attacks and the incorporation of different countermeasures has to be considered. This paper surveys the methods and techniques employed in these attacks, the destructive effects of such attacks, the countermeasures against such attacks and evaluation of their feasibility and applicability. Finally, the necessity and feasibility of adopting this kind of physical security testing and evaluation in the development of FIPS 140-3 standard are explored. This paper is not only a survey paper, but also more a position paper.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Unknown where it was published
Contact author(s)
zyb @ is iscas ac cn
History
2005-10-30: received
Short URL
https://ia.cr/2005/388
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2005/388,
      author = {YongBin Zhou and DengGuo Feng},
      title = {Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing},
      howpublished = {Cryptology {ePrint} Archive, Paper 2005/388},
      year = {2005},
      url = {https://eprint.iacr.org/2005/388}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.