Paper 2005/388
Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing
YongBin Zhou and DengGuo Feng
Abstract
Side-channel attacks are easy-to-implement whilst powerful attacks against cryptographic implementations, and their targets range from primitives, protocols, modules, and devices to even systems. These attacks pose a serious threat to the security of cryptographic modules. In consequence, cryptographic implementations have to be evaluated for their resistivity against such attacks and the incorporation of different countermeasures has to be considered. This paper surveys the methods and techniques employed in these attacks, the destructive effects of such attacks, the countermeasures against such attacks and evaluation of their feasibility and applicability. Finally, the necessity and feasibility of adopting this kind of physical security testing and evaluation in the development of FIPS 140-3 standard are explored. This paper is not only a survey paper, but also more a position paper.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. Unknown where it was published
- Contact author(s)
- zyb @ is iscas ac cn
- History
- 2005-10-30: received
- Short URL
- https://ia.cr/2005/388
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2005/388, author = {YongBin Zhou and DengGuo Feng}, title = {Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing}, howpublished = {Cryptology {ePrint} Archive, Paper 2005/388}, year = {2005}, url = {https://eprint.iacr.org/2005/388} }