DocumentCode :
134955
Title :
Side channel attacks and their mitigation techniques
Author :
Khan, Ajoy Kumar ; Mahanta, Hridoy Jyoti
Author_Institution :
Dept. of Inf. Technol., Assam Univ., Silchar, India
fYear :
2014
fDate :
1-2 Feb. 2014
Firstpage :
1
Lastpage :
4
Abstract :
Side channel cryptanalysis is one of the most volatile fields of research in security prospects. It has proved that cryptanalysis is no more confined to its dependence on plain text or cipher text. Indeed side channel attack uses the physical characteristics of the cryptographic device to find the cryptographic algorithm used and also the secret key. It is one of the most efficient techniques and has successfully broken almost all the cryptographic algorithms today. In this paper we aim to present a review on the various side channel attacks possible. Also, the techniques proposed to mitigate such an attack have been stated.
Keywords :
cryptography; cryptographic device; ivolatile field; mitigation technique; security prospect; side channel attack; side channel cryptanalysis; Ciphers; Elliptic curve cryptography; Encryption; Hardware; Timing; AES; DES; DPA; Power Analysis; SPA; cryptographic devic;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Automation, Control, Energy and Systems (ACES), 2014 First International Conference on
Conference_Location :
Hooghy
Print_ISBN :
978-1-4799-3893-3
Type :
conf
DOI :
10.1109/ACES.2014.6807983
Filename :
6807983
Link To Document :
بازگشت