• DocumentCode
    134955
  • Title

    Side channel attacks and their mitigation techniques

  • Author

    Khan, Ajoy Kumar ; Mahanta, Hridoy Jyoti

  • Author_Institution
    Dept. of Inf. Technol., Assam Univ., Silchar, India
  • fYear
    2014
  • fDate
    1-2 Feb. 2014
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    Side channel cryptanalysis is one of the most volatile fields of research in security prospects. It has proved that cryptanalysis is no more confined to its dependence on plain text or cipher text. Indeed side channel attack uses the physical characteristics of the cryptographic device to find the cryptographic algorithm used and also the secret key. It is one of the most efficient techniques and has successfully broken almost all the cryptographic algorithms today. In this paper we aim to present a review on the various side channel attacks possible. Also, the techniques proposed to mitigate such an attack have been stated.
  • Keywords
    cryptography; cryptographic device; ivolatile field; mitigation technique; security prospect; side channel attack; side channel cryptanalysis; Ciphers; Elliptic curve cryptography; Encryption; Hardware; Timing; AES; DES; DPA; Power Analysis; SPA; cryptographic devic;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Automation, Control, Energy and Systems (ACES), 2014 First International Conference on
  • Conference_Location
    Hooghy
  • Print_ISBN
    978-1-4799-3893-3
  • Type

    conf

  • DOI
    10.1109/ACES.2014.6807983
  • Filename
    6807983