Presentation is loading. Please wait.

Presentation is loading. Please wait.

SIDE CHANNEL ATTACKS Presented by: Vishwanath Patil Abhay Jalisatgi.

Similar presentations


Presentation on theme: "SIDE CHANNEL ATTACKS Presented by: Vishwanath Patil Abhay Jalisatgi."— Presentation transcript:

1 SIDE CHANNEL ATTACKS Presented by: Vishwanath Patil Abhay Jalisatgi

2 Overview  Introduction  What are Side Channel Attacks?  Types of Side Channel Attacks  Prevention  Summary

3 Introduction  Cryptographic algorithms are usually found to be resistant against most intrusive type of attacks theoretically.  The practical application of these algorithms pave way for several different types of attacks.  One of them is SIDE CHANNEL ATTACK.

4 What are Side Channel Attacks?  Attacks originating from information gained from the physical implementation of a cryptosystem.

5 Types of Side Channel Attacks  Timing Attacks  Based on measuring the amount of time various computations take to perform.  Timing measurements are fed to a statistical model that provides guessed bit key with a certain level of accuracy.  The number of samples required to retrieve the information depends on signal properties and noise.

6 Types of Side Channel Attacks  Power Analysis Attacks  Based on varying power consumption by the hardware during computation.  Further categorized into o Simple Power Analysis(SPA) o Differential Power Analysis(DPA)

7 Types of Side Channel Attacks  Simple Power Analysis(SPA) Attacks  Involves direct interpretation of power consumption measurements collected during cryptographic operations.  SPA can reveal the sequence of microprocessor instructions executed.  Sonic spectrum measured using an ultrasonic microphone.

8 Types of Side Channel Attacks  Differential Power Analysis  Involves statistical analysis of power consumption measurements from a cryptosystem.  Have signal processing & error correction properties.

9 Types of Side Channel Attacks  Differential Fault Analysis  Rely on extracting keys by generating faults in a cryptographic system.  Based on encrypting the same piece of data twice and comparing the results.

10 Prevention  General countermeasures:  Data Independent Calculations  Binding  Licensing Modified Algorithms  Countermeasures against timing attacks:  Adding Delays  Time Equalization of Multiplication & Squaring

11 Prevention  Countermeasures against power analysis attacks  Power Consumption Balancing  Reduction of Signal Size  Addition of Noise  Shielding  Modification of Algorithm Design  Countermeasures against fault attacks  Running the encryption twice

12 Summary  Using Side Channel information, it becomes easy to gain secret information from a device.  Protecting against these can be a challenge, is costly and must be done with utmost care.  Side Channel countermeasures find application mostly in high-security areas such as in banking industry, online payment applications.


Download ppt "SIDE CHANNEL ATTACKS Presented by: Vishwanath Patil Abhay Jalisatgi."

Similar presentations


Ads by Google