Download presentation
Presentation is loading. Please wait.
Published byRonald Dawson Modified over 9 years ago
1
SIDE CHANNEL ATTACKS Presented by: Vishwanath Patil Abhay Jalisatgi
2
Overview Introduction What are Side Channel Attacks? Types of Side Channel Attacks Prevention Summary
3
Introduction Cryptographic algorithms are usually found to be resistant against most intrusive type of attacks theoretically. The practical application of these algorithms pave way for several different types of attacks. One of them is SIDE CHANNEL ATTACK.
4
What are Side Channel Attacks? Attacks originating from information gained from the physical implementation of a cryptosystem.
5
Types of Side Channel Attacks Timing Attacks Based on measuring the amount of time various computations take to perform. Timing measurements are fed to a statistical model that provides guessed bit key with a certain level of accuracy. The number of samples required to retrieve the information depends on signal properties and noise.
6
Types of Side Channel Attacks Power Analysis Attacks Based on varying power consumption by the hardware during computation. Further categorized into o Simple Power Analysis(SPA) o Differential Power Analysis(DPA)
7
Types of Side Channel Attacks Simple Power Analysis(SPA) Attacks Involves direct interpretation of power consumption measurements collected during cryptographic operations. SPA can reveal the sequence of microprocessor instructions executed. Sonic spectrum measured using an ultrasonic microphone.
8
Types of Side Channel Attacks Differential Power Analysis Involves statistical analysis of power consumption measurements from a cryptosystem. Have signal processing & error correction properties.
9
Types of Side Channel Attacks Differential Fault Analysis Rely on extracting keys by generating faults in a cryptographic system. Based on encrypting the same piece of data twice and comparing the results.
10
Prevention General countermeasures: Data Independent Calculations Binding Licensing Modified Algorithms Countermeasures against timing attacks: Adding Delays Time Equalization of Multiplication & Squaring
11
Prevention Countermeasures against power analysis attacks Power Consumption Balancing Reduction of Signal Size Addition of Noise Shielding Modification of Algorithm Design Countermeasures against fault attacks Running the encryption twice
12
Summary Using Side Channel information, it becomes easy to gain secret information from a device. Protecting against these can be a challenge, is costly and must be done with utmost care. Side Channel countermeasures find application mostly in high-security areas such as in banking industry, online payment applications.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.