Accelerating Side Channel Analysis with Distributed and Parallelized Processing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32805
Accelerating Side Channel Analysis with Distributed and Parallelized Processing

Authors: Kyunghee Oh, Dooho Choi

Abstract:

Although there is no theoretical weakness in a cryptographic algorithm, Side Channel Analysis can find out some secret data from the physical implementation of a cryptosystem. The analysis is based on extra information such as timing information, power consumption, electromagnetic leaks or even sound which can be exploited to break the system. Differential Power Analysis is one of the most popular analyses, as computing the statistical correlations of the secret keys and power consumptions. It is usually necessary to calculate huge data and takes a long time. It may take several weeks for some devices with countermeasures. We suggest and evaluate the methods to shorten the time to analyze cryptosystems. Our methods include distributed computing and parallelized processing.

Keywords: DPA, distributed computing, parallelized processing.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1092582

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1850

References:


[1] P. Kocher, J. Jaffe, and B. Jun, Differential power analysis, Advances In Cryptology - CRYPTO' 99, LNCS 1666 Springer-Verlag, pp. 388-397, Santa Barbara, USA, August 1999
[2] S. B. Örs, E. Oswald, B. Preneel, Power-Analysis Attacks on an FPGA - First Experimental Results, CHES 2003.
[3] Hans ChristophHudde, GPU assisted Mutual Information Analysis Attacks on AES, Bachelor Thesis, Ruhr-Universität Bochum, April 2010
[4] Riscure Inspector, https://www.riscure.com/security-tools/inspector-sca/, 2014.3
[5] Brightsight Sideways, http://www.brightsight.com/tools/sideways, 2014.3