Accelerating Side Channel Analysis with Distributed and Parallelized Processing
Although there is no theoretical weakness in a cryptographic algorithm, Side Channel Analysis can find out some secret data from the physical implementation of a cryptosystem. The analysis is based on extra information such as timing information, power consumption, electromagnetic leaks or even sound which can be exploited to break the system. Differential Power Analysis is one of the most popular analyses, as computing the statistical correlations of the secret keys and power consumptions. It is usually necessary to calculate huge data and takes a long time. It may take several weeks for some devices with countermeasures. We suggest and evaluate the methods to shorten the time to analyze cryptosystems. Our methods include distributed computing and parallelized processing.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1092582Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1475
 P. Kocher, J. Jaffe, and B. Jun, Differential power analysis, Advances In Cryptology - CRYPTO' 99, LNCS 1666 Springer-Verlag, pp. 388-397, Santa Barbara, USA, August 1999
 S. B. Örs, E. Oswald, B. Preneel, Power-Analysis Attacks on an FPGA - First Experimental Results, CHES 2003.
 Hans ChristophHudde, GPU assisted Mutual Information Analysis Attacks on AES, Bachelor Thesis, Ruhr-Universität Bochum, April 2010
 Riscure Inspector, https://www.riscure.com/security-tools/inspector-sca/, 2014.3
 Brightsight Sideways, http://www.brightsight.com/tools/sideways, 2014.3