Projects per year
As cryptographic implementations are increasingly subsumed as functional blocks within larger systems on chip, it becomes more difficult to identify the power consumption signatures of cryptographic operations amongst other unrelated processing activities. In addition, at higher clock frequencies, the current decay between successive processing rounds is only partial, making it more difficult to apply existing pattern matching techniques in side-channel analysis. We show however, through the use of a phase-sensitive detector, that power traces can be pre-processed to generate a filtered output which exhibits an enhanced round pattern, enabling the identification of locations on a device where encryption operations are occurring and also assisting with the re-alignment of power traces for side-channel attacks.
|Title of host publication
|Hardware-Oriented Security and Trust (HOST), 2013 IEEE International Symposium on
|Institute of Electrical and Electronics Engineers Inc.
|Number of pages
|Published - Jun 2013
|IEEE Intl. Symposium on Hardware-Oriented Security and Trust - Austin, United States
Duration: 06 Jun 2013 → …
|IEEE Intl. Symposium on Hardware-Oriented Security and Trust
|06/06/2013 → …